VYPR
High severity8.1NVD Advisory· Published Mar 17, 2026· Updated May 19, 2026

CVE-2026-30707

CVE-2026-30707

Description

An issue was discovered in SpeedExam Online Examination System (SaaS) after v.FEV2026. It allows Broken Access Control via the ReviewAnswerDetails ASP.NET PageMethod. Authenticated attackers can bypass client-side restrictions and invoke this method directly to retrieve the full answer key. The provider states that this issue is "Fixed in [02/2026] backend service update."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SpeedExam Online Examination System (SaaS) suffers from broken access control allowing authenticated attackers to retrieve the full answer key by directly invoking the ReviewAnswerDetails ASP.NET PageMethod.

Vulnerability

Details

The vulnerability resides in the ASP.NET AJAX PageMethods implementation used by SpeedExam's online examination platform. The developer inadvertently exposed all administrative and exam interaction functions to the client-side JavaScript, including the ReviewAnswerDetails method. This method lacks server-side authorization checks, allowing any authenticated user to invoke it directly without proper access control [1]. The root cause is a classic case of broken access control, where client-side restrictions are the only barrier to sensitive functionality.

Exploitation

An authenticated attacker can exploit this by using the browser's developer console to call the ReviewAnswerDetails PageMethod. First, the attacker obtains question IDs by calling the ExamQuestionAnswerDetails method, which also requires no parameters. Then, by invoking ReviewAnswerDetails with the obtained question IDs, the server returns the correct answers (the answer key) without the attacker having to complete the exam [1]. No additional authentication or network position is required beyond being logged into the platform.

Impact

Successful exploitation allows an attacker to extract the full answer key for any exam, undermining the integrity of the examination system. This can lead to widespread cheating, devaluation of certifications, and loss of trust in the platform. The impact is particularly severe for a SaaS product used by multiple institutions.

Mitigation

The vendor states that this issue was fixed in a backend service update deployed in February 2026. Users are advised to ensure their instance is running the latest version. No workaround is available for unpatched instances.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.