The WorkExaminer Professional console is used for administrative access to the server. Before access to the console is granted administrators must login. Internally, a custom protocol is used to call a respective stored procedure on the MSSQL database. The return value of the call is not validated on the server-side. Instead it is only validated client-side which allows to bypass authentication.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
The vendor responded to the submission of our security vulnerabilities by stating that they are not within the scope of their bug bounty program. After telling them that we do not care about the bug bounty but a fix for the issues, we did not receive any further response. Hence, there is no fix available for the identified security issues and we assume that this product is unmaintained. We urge customers to contact EfficientLab regarding the issues and a potential solution, such as using another product.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://r.sec-consult.com/workexaminer |
![]() ![]() |
Tue, 21 Oct 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated attacker with access to TCP port 12306 of the WorkExaminer server can exploit missing server-side authentication checks to bypass the login prompt in the WorkExaminer Professional console to gain administrative access to the WorkExaminer server and therefore all sensitive monitoring data. This includes monitored screenshots and keystrokes of all users. The WorkExaminer Professional console is used for administrative access to the server. Before access to the console is granted administrators must login. Internally, a custom protocol is used to call a respective stored procedure on the MSSQL database. The return value of the call is not validated on the server-side. Instead it is only validated client-side which allows to bypass authentication. | |
Title | Missing Server-Side Authentication Checks in EfficientLab WorkExaminer Professional | |
Weaknesses | CWE-602 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-10-21T11:43:44.598Z
Reserved: 2025-09-17T14:05:16.432Z
Link: CVE-2025-10640

No data.

Status : Awaiting Analysis
Published: 2025-10-21T12:15:35.420
Modified: 2025-10-21T19:31:25.450
Link: CVE-2025-10640

No data.

No data.