The WorkExaminer Professional server installation comes with an FTP server that is used to receive the client logs on TCP port 12304. An attacker with network access to this port can use weak hardcoded credentials to login to the FTP server and modify or read data, log files and gain remote code execution as NT Authority\SYSTEM on the server by exchanging accessible service binaries in the WorkExaminer installation directory (e.g. "C:\Program File (x86)\Work Examiner Professional Server").
                
            References
                    | Link | Resource | 
|---|---|
| https://r.sec-consult.com/workexaminer | 
Configurations
                    No configuration.
History
                    22 Oct 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.8 | 
21 Oct 2025, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-10-21 12:15
Updated : 2025-10-22 19:15
NVD link : CVE-2025-10639
Mitre link : CVE-2025-10639
CVE.ORG link : CVE-2025-10639
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
