School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data.
PUBLISHED5.2CWE-639
Zyosoft|School App - Insecure Direct Object Reference
Problem type
Affected products
Zyosoft
School App
< 1.1.62 - AFFECTED
School App
< 2.7.2 - AFFECTED
References
twcert.org.tw
https://www.twcert.org.tw/tw/cp-132-10896-e3240-1.html
twcert.org.tw
https://www.twcert.org.tw/en/cp-139-10897-64257-2.html
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-7491Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-7491",
"assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
"assignerShortName": "twcert",
"dateUpdated": "2026-05-02T09:14:25.760Z",
"dateReserved": "2026-04-30T09:01:07.205Z",
"datePublished": "2026-05-02T09:14:25.760Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
"shortName": "twcert",
"dateUpdated": "2026-05-02T09:14:25.760Z"
},
"datePublic": "2026-05-02T09:08:00.000Z",
"title": "Zyosoft|School App - Insecure Direct Object Reference",
"descriptions": [
{
"lang": "en",
"value": "School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data."
}
]
}
],
"affected": [
{
"vendor": "Zyosoft",
"product": "School App",
"platforms": [
"Android"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.1.62"
}
]
},
{
"vendor": "Zyosoft",
"product": "School App",
"platforms": [
"MacOS"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "2.7.2"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-639 Authorization bypass through User-Controlled key",
"cweId": "CWE-639",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-10896-e3240-1.html",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://www.twcert.org.tw/en/cp-139-10897-64257-2.html",
"tags": [
"third-party-advisory"
]
}
],
"impacts": [
{
"capecId": "CAPEC-21",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-21 Exploitation of Trusted Identifiers"
}
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
}
}
],
"solutions": [
{
"lang": "en",
"value": "Update School App (Android) to version 1.1.62 or later\n\nUpdate School App (iOS) to version 2.7.2 or later",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Update School App (Android) to version 1.1.62 or later\n<br>Update School App (iOS) to version 2.7.2 or later"
}
]
}
]
}
}
}