Seeyon Zhiyuan OA Web Application System versions up to and including 7.0 SP1 improperly decode and parse the `enc` parameter in thirdpartyController.do. The decoded map values can influence session attributes without sufficient authentication/authorization checks, enabling attackers to assign a session to arbitrary user IDs. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-30 at 00:30:40.855917 UTC.
CVSS
No CVSS.
References
Configurations
No configuration.
History
31 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/chaitin/xray/blob/f90cf321bc4d294bbf6625a9c4853f3bfdf0a384/pocs/seeyon-oa-cookie-leak.yml - |
30 Oct 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-30 22:15
Updated : 2025-10-31 19:15
NVD link : CVE-2021-4461
Mitre link : CVE-2021-4461
CVE.ORG link : CVE-2021-4461
JSON object : View
Products Affected
No product.
CWE
CWE-306
Missing Authentication for Critical Function
