{"id":61032,"date":"2025-08-07T15:18:55","date_gmt":"2025-08-07T15:18:55","guid":{"rendered":""},"modified":"2025-09-12T02:15:04","modified_gmt":"2025-09-12T08:15:04","slug":"cve-2025-50870-incorrect-access-control-vulnerability-in-institute-of-current-students-1-0","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-50870-incorrect-access-control-vulnerability-in-institute-of-current-students-1-0\/","title":{"rendered":"<strong>CVE-2025-50870: Incorrect Access Control Vulnerability in Institute-of-Current-Students 1.0<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The Institute-of-Current-Students 1.0, a widely used educational platform, is reported to have a critical vulnerability, CVE-2025-50870. This vulnerability, an instance of Incorrect Access Control, is associated with the mydetailsstudent.php endpoint. It exposes <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43233-critical-https-proxy-vulnerability-allowing-sensitive-data-access\/\"  data-wpil-monitor-id=\"69365\">sensitive user data and allows<\/a> potential system compromise. Given the widespread adoption of this platform, the vulnerability could have far-reaching consequences, including <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-53495-unauthorized-access-data-leakage-in-wikimedia-foundation-mediawiki-abusefilter-extension\/\"  data-wpil-monitor-id=\"72501\">data leakage<\/a> and privacy violation of students.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-50870<br \/>\nSeverity: Critical (9.8 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: Information disclosure, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36600-dell-bios-improper-access-control-vulnerability-allows-potential-system-compromise\/\"  data-wpil-monitor-id=\"70118\">potential system<\/a> compromise, and data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-2778394882\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Institute-of-Current-Students | 1.0<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The vulnerability lies within the mydetailsstudent.php endpoint of the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5243-critical-security-vulnerability-in-smg-software-information-portal\/\"  data-wpil-monitor-id=\"69366\">Institute-of-Current-Students<\/a> 1.0 software. Specifically, the myds GET parameter, which is designed to accept an email address as input and fetch the corresponding student&#8217;s personal information, fails to validate the identity or <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-31279-critical-permission-issue-allowing-user-fingerprinting-in-macos-and-ipados\/\"  data-wpil-monitor-id=\"81915\">permissions of the requesting user<\/a>. Thus, it allows both authenticated and <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-42959-unauthenticated-replay-attack-exploiting-hmac-reuse\/\"  data-wpil-monitor-id=\"72502\">unauthenticated attackers<\/a> to manipulate the email value in the request URL and obtain sensitive student details.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2506844237\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here&#8217;s a conceptual example of how the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36845-server-side-request-forgery-ssrf-vulnerability-in-eveo-urve-web-manager\/\"  data-wpil-monitor-id=\"70658\">vulnerability might be exploited using a HTTP GET request:<\/a><\/p>\n<pre><code class=\"\" data-line=\"\">GET \/mydetailsstudent.php?myds=target-email@example.com HTTP\/1.1\nHost: vulnerable-institute.com<\/code><\/pre>\n<p>In this example, an attacker can simply replace &#8220;target-email@example.com&#8221; with the email address of any student they wish to target. The server will then respond with the personal details associated with that email address, leading to potential <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-45620-remote-information-disclosure-vulnerability-in-aver-ptc310uv2\/\"  data-wpil-monitor-id=\"70177\">information disclosure<\/a>.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>The optimal <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52376-authentication-bypass-vulnerability-in-nexxt-solutions-ncm-x1800-mesh-router\/\"  data-wpil-monitor-id=\"75464\">solution to this vulnerability<\/a> is to apply the vendor-supplied patch. Until the patch is applied, a Web Application Firewall (WAF) or Intrusion Detection System (IDS) could be used as a temporary mitigation measure. It is strongly advised to ensure that the identity and permissions of the requesting <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50738-memos-application-vulnerability-allows-for-unauthorized-user-information-disclosure\/\"  data-wpil-monitor-id=\"70119\">user are validated before returning personal information<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The Institute-of-Current-Students 1.0, a widely used educational platform, is reported to have a critical vulnerability, CVE-2025-50870. This vulnerability, an instance of Incorrect Access Control, is associated with the mydetailsstudent.php endpoint. It exposes sensitive user data and allows potential system compromise. Given the widespread adoption of this platform, the vulnerability could have far-reaching consequences, including [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-61032","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/61032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=61032"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/61032\/revisions"}],"predecessor-version":[{"id":74376,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/61032\/revisions\/74376"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=61032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=61032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=61032"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=61032"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=61032"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=61032"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=61032"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=61032"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=61032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}