A vulnerability was detected in ZKTeco BioTime up to 9.0.3/9.0.4/9.5.2. This affects an unknown part of the file /base/safe_setting/ of the component Endpoint. Performing manipulation of the argument backup_encryption_password_decrypt/export_encryption_password_decrypt results in unprotected storage of credentials. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
ZKTeco BioTime Endpoint safe_setting credentials storage
Problem type
Affected products
ZKTeco
9.0.0 - AFFECTED
9.0.1 - AFFECTED
9.0.2 - AFFECTED
9.0.3 - AFFECTED
9.0.4 - AFFECTED
9.5.0 - AFFECTED
9.5.1 - AFFECTED
9.5.2 - AFFECTED
References
https://vuldb.com/?id.338506
https://vuldb.com/?ctiid.338506
https://vuldb.com/?submit.711813
https://github.com/ionutluca888/IDOR-POC-ZKBio-Time/tree/main
GitHub Security Advisories
GHSA-hq3q-62v8-pp48
A vulnerability was detected in ZKTeco BioTime up to 9.0.3/9.0.4/9.5.2. This affects an unknown...
https://github.com/advisories/GHSA-hq3q-62v8-pp48A vulnerability was detected in ZKTeco BioTime up to 9.0.3/9.0.4/9.5.2. This affects an unknown part of the file /base/safe_setting/ of the component Endpoint. Performing manipulation of the argument backup_encryption_password_decrypt/export_encryption_password_decrypt results in unprotected storage of credentials. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
https://nvd.nist.gov/vuln/detail/CVE-2025-15128
https://github.com/ionutluca888/IDOR-POC-ZKBio-Time/tree/main
https://vuldb.com/?ctiid.338506
https://vuldb.com/?id.338506
https://vuldb.com/?submit.711813
https://github.com/advisories/GHSA-hq3q-62v8-pp48
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-15128Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-15128",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2025-12-28T08:32:10.069Z",
"dateReserved": "2025-12-27T09:08:42.325Z",
"datePublished": "2025-12-28T08:32:10.069Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2025-12-28T08:32:10.069Z"
},
"title": "ZKTeco BioTime Endpoint safe_setting credentials storage",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was detected in ZKTeco BioTime up to 9.0.3/9.0.4/9.5.2. This affects an unknown part of the file /base/safe_setting/ of the component Endpoint. Performing manipulation of the argument backup_encryption_password_decrypt/export_encryption_password_decrypt results in unprotected storage of credentials. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"affected": [
{
"vendor": "ZKTeco",
"product": "BioTime",
"modules": [
"Endpoint"
],
"versions": [
{
"version": "9.0.0",
"status": "affected"
},
{
"version": "9.0.1",
"status": "affected"
},
{
"version": "9.0.2",
"status": "affected"
},
{
"version": "9.0.3",
"status": "affected"
},
{
"version": "9.0.4",
"status": "affected"
},
{
"version": "9.5.0",
"status": "affected"
},
{
"version": "9.5.1",
"status": "affected"
},
{
"version": "9.5.2",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Unprotected Storage of Credentials",
"cweId": "CWE-256",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Credentials Management",
"cweId": "CWE-255",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.338506",
"name": "VDB-338506 | ZKTeco BioTime Endpoint safe_setting credentials storage",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.338506",
"name": "VDB-338506 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.711813",
"name": "Submit #711813 | ZkBioTime CMS 9.0.3, 9.0.4, 9.5.2 IDOR",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/ionutluca888/IDOR-POC-ZKBio-Time/tree/main",
"tags": [
"exploit"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR",
"baseScore": 5
}
}
],
"timeline": [
{
"time": "2025-12-27T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2025-12-27T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2025-12-27T10:13:48.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "luca_irinel (VulDB User)",
"type": "reporter"
}
]
}
}
}