Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-25875
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PlaciPy Admin Privilege Escalation via Trusted JWT Claims
Source: NVD (National Vulnerability Database)
Vulnerability Description
PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, The admin authorization middleware trusts client-controlled JWT claims (role and scope) without enforcing server-side role verification.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不正确
Source: NVD (National Vulnerability Database)
Vulnerability Title
PlaciPy 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PlaciPy是Praskla Technology开源的一个综合性的就业管理系统,旨在为教育机构简化学生、培训人员和管理人员的就业流程。 PlaciPy 1.0.0版本存在安全漏洞,该漏洞源于管理员授权中间件信任客户端控制的JWT声明而未执行服务器端角色验证,可能导致权限提升。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Praskla-Technologyassessment-placipy = 1.0.0 -
II. Public POCs for CVE-2026-25875
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2026-25875
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-25875

No comments yet


Leave a comment