An unauthenticated attacker with access to TCP port 12306 of the WorkExaminer server can exploit missing server-side authentication checks to bypass the login prompt in the WorkExaminer Professional console to gain administrative access to the WorkExaminer server and therefore all sensitive monitoring data. This includes monitored screenshots and keystrokes of all users.
The WorkExaminer Professional console is used for administrative access to the server. Before access to the console is granted administrators must login. Internally, a custom protocol is used to call a respective stored procedure on the MSSQL database. The return value of the call is not validated on the server-side. Instead it is only validated client-side which allows to bypass authentication.
References
| Link | Resource |
|---|---|
| https://r.sec-consult.com/workexaminer |
Configurations
No configuration.
History
22 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
21 Oct 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-21 12:15
Updated : 2025-10-22 19:15
NVD link : CVE-2025-10640
Mitre link : CVE-2025-10640
CVE.ORG link : CVE-2025-10640
JSON object : View
Products Affected
No product.
CWE
CWE-602
Client-Side Enforcement of Server-Side Security
