Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25980: Improper Access Control

0
Medium
VulnerabilityCVE-2024-25980cvecve-2024-25980
Published: Mon Feb 19 2024 (02/19/2024, 16:32:08 UTC)
Source: CVE Database V5

Description

CVE-2024-25980 is an improper access control vulnerability affecting the H5P attempts report in certain versions of a platform using Separate Groups mode. The flaw causes group restrictions to be ignored, allowing non-editing teachers to view users from other groups. This exposure is limited to read-only access and does not allow modification of data. The vulnerability has a CVSS score of 4. 3 (medium severity) and requires low privileges but no user interaction. No known exploits are currently reported in the wild. Organizations using affected versions 4. 2. 0 and 4. 3.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:50:44 UTC

Technical Analysis

CVE-2024-25980 is a medium severity improper access control vulnerability identified in the H5P attempts report feature of a platform supporting Separate Groups mode. Separate Groups mode is designed to restrict users’ visibility and interaction to their own groups, typically used in educational or collaborative environments to isolate data access. However, due to this vulnerability, the system fails to enforce these group restrictions properly within the H5P attempts report, resulting in users—specifically non-editing teachers—being able to view attempt data from users outside their assigned groups. The vulnerability affects versions 4.2.0 and 4.3.0, as well as an unspecified version labeled '0' in the data. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates that the vulnerability can be exploited remotely over the network with low attack complexity, requires privileges equivalent to a non-editing teacher, and does not require user interaction. The impact is limited to confidentiality, exposing user attempt data across group boundaries without integrity or availability impact. No patches or known exploits in the wild have been reported as of the publication date (February 19, 2024). This vulnerability primarily affects educational institutions or organizations using the platform’s group-based access controls to segregate user data.

Potential Impact

The primary impact of CVE-2024-25980 is unauthorized disclosure of user attempt data across group boundaries, violating confidentiality principles. Although the exposure is limited to non-editing teachers and read-only access, it can lead to privacy concerns, especially in educational environments where student data is sensitive. Attackers or unauthorized users with non-editing teacher privileges could gain insights into other groups’ activities, potentially undermining trust and compliance with data protection regulations such as FERPA or GDPR. The vulnerability does not affect data integrity or system availability, nor does it allow privilege escalation. However, the breach of group isolation could facilitate further social engineering or targeted attacks. Organizations relying heavily on group segregation for data privacy and compliance may face reputational damage and regulatory scrutiny if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-25980, organizations should first verify if they are running affected versions (4.2.0, 4.3.0, or the unspecified '0' version) of the platform. Immediate steps include: 1) Applying any available patches or updates from the vendor as soon as they are released. Since no patch links are currently provided, monitor vendor advisories closely. 2) Temporarily disabling or restricting access to the H5P attempts report feature for non-editing teachers until a fix is applied. 3) Reviewing and tightening role-based access controls to ensure that only authorized users have non-editing teacher privileges. 4) Implementing additional monitoring and logging of access to sensitive reports to detect any unauthorized data access attempts. 5) Educating staff about the sensitivity of cross-group data exposure and encouraging prompt reporting of suspicious activity. 6) If feasible, segregate sensitive user data at the database or application layer to provide defense-in-depth beyond application-level controls. These targeted mitigations go beyond generic advice by focusing on role restrictions, feature access control, and proactive monitoring.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2024-02-13T18:10:15.371Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d73b7ef31ef0b57247a

Added to database: 2/25/2026, 9:45:23 PM

Last enriched: 2/26/2026, 10:50:44 AM

Last updated: 2/26/2026, 11:07:18 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats