Vulnerability Description
A vulnerability was found in zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the file /adpweb/wechat/verifyToken/. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zhilink | Adp Application Developer Platform | 1.0.0 |
Related Weaknesses (CWE)
References
- https://vuldb.com/?ctiid.310496Permissions RequiredVDB Entry
- https://vuldb.com/?id.310496Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.581277Third Party AdvisoryVDB Entry
FAQ
What is CVE-2025-5326?
CVE-2025-5326 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was found in zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the file /adpweb...
How severe is CVE-2025-5326?
CVE-2025-5326 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-5326?
Check the references section above for vendor advisories and patch information. Affected products include: Zhilink Adp Application Developer Platform.