{"api_version":"1","generated_at":"2026-04-22T16:29:38+00:00","cve":"CVE-2022-28742","urls":{"html":"https://cve.report/CVE-2022-28742","api":"https://cve.report/api/cve/CVE-2022-28742.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-28742","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-28742"},"summary":{"title":"CVE-2022-28742","description":"aEnrich eHRD Learning Management Key Performance Indicator System 5+ has Improper Access Control. The web application does not validate user session when accessing many application pages. This can allow an attacker to gain unauthenticated access to sensitive functionalities in the application","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-09-09 16:15:00","updated_at":"2022-09-14 18:27:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://www.aenrich.com.tw","name":"https://www.aenrich.com.tw","refsource":"MISC","tags":[],"title":"aEnrich育碁a+HRD: LMS/eHRD應用成效第一．成就企業卓越人才","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0036/MNDT-2022-0036.md","name":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0036/MNDT-2022-0036.md","refsource":"MISC","tags":[],"title":"Vulnerability-Disclosures/MNDT-2022-0036.md at master · mandiant/Vulnerability-Disclosures · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-28742","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28742","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"28742","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"aenrich","cpe5":"a\\+hrd","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-28742","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"aEnrich eHRD Learning Management Key Performance Indicator System 5+ has Improper Access Control. The web application does not validate user session when accessing many application pages. This can allow an attacker to gain unauthenticated access to sensitive functionalities in the application"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.aenrich.com.tw","refsource":"MISC","name":"https://www.aenrich.com.tw"},{"refsource":"MISC","name":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0036/MNDT-2022-0036.md","url":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0036/MNDT-2022-0036.md"}]}},"nvd":{"publishedDate":"2022-09-09 16:15:00","lastModifiedDate":"2022-09-14 18:27:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:aenrich:a\\+hrd:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.4.1125v112","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:aenrich:a\\+hrd:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"7.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:aenrich:a\\+hrd:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"5.6.1067v110","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:aenrich:a\\+hrd:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.5.1098v156","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}