{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7491","assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","state":"PUBLISHED","assignerShortName":"twcert","dateReserved":"2026-04-30T09:01:07.205Z","datePublished":"2026-05-02T09:14:25.760Z","dateUpdated":"2026-05-02T09:14:25.760Z"},"containers":{"cna":{"providerMetadata":{"orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert","dateUpdated":"2026-05-02T09:14:25.760Z"},"title":"Zyosoft｜School App - Insecure Direct Object Reference","datePublic":"2026-05-02T09:08:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-639","description":"CWE-639 Authorization bypass through User-Controlled key","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-21","descriptions":[{"lang":"en","value":"CAPEC-21 Exploitation of Trusted Identifiers"}]}],"affected":[{"vendor":"Zyosoft","product":"School App","platforms":["Android"],"versions":[{"status":"affected","version":"0","lessThan":"1.1.62","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Zyosoft","product":"School App","platforms":["MacOS"],"versions":[{"status":"affected","version":"0","lessThan":"2.7.2","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data.","supportingMedia":[{"type":"text/html","base64":false,"value":"School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data."}]}],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-10896-e3240-1.html","tags":["third-party-advisory"]},{"url":"https://www.twcert.org.tw/en/cp-139-10897-64257-2.html","tags":["third-party-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"HIGH","baseScore":8.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseSeverity":"HIGH","baseScore":8.1,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}}],"solutions":[{"lang":"en","value":"Update School App (Android) to version 1.1.62 or later\n\nUpdate School App (iOS) to version 2.7.2 or later","supportingMedia":[{"type":"text/html","base64":false,"value":"Update School App (Android) to version 1.1.62 or later\n<br>Update School App (iOS) to version 2.7.2 or later"}]}],"source":{"advisory":"TVN-202604013","discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 1.0.2"}}}}