Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11280: Direct Request in Frappe LMS

0
Medium
VulnerabilityCVE-2025-11280cvecve-2025-11280
Published: Sun Oct 05 2025 (10/05/2025, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Frappe
Product: LMS

Description

A flaw has been found in Frappe LMS 2.35.0. Impacted is an unknown function of the file /files/ of the component Assignment Picture Handler. This manipulation causes direct request. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitability is considered difficult. The exploit has been published and may be used. It is advisable to upgrade the affected component. The vendor was informed early about a total of four security issues and confirmed that those have been fixed. However, the release notes on GitHub do not mention them.

AI-Powered Analysis

AILast updated: 10/05/2025, 04:00:41 UTC

Technical Analysis

CVE-2025-11280 is a medium-severity vulnerability identified in Frappe LMS version 2.35.0, specifically within the Assignment Picture Handler component located in the /files/ directory. The vulnerability allows for a 'direct request' manipulation, which implies that an attacker can directly interact with a resource or function in an unintended manner. The flaw is remotely exploitable without requiring authentication or user interaction, but the attack complexity is rated as high and exploitability is considered difficult. This suggests that while the vulnerability can be triggered remotely, it requires significant skill or specific conditions to successfully exploit. The CVSS 4.0 vector (AV:N/AC:H/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates network attack vector, high attack complexity, no privileges or user interaction needed, and partial impact on confidentiality (low), with no impact on integrity or availability. The vendor was notified early about four security issues, including this one, and claims to have fixed them, though the release notes on GitHub do not explicitly mention these fixes. No official patch links are provided, and no known exploits are currently observed in the wild. The vulnerability likely allows unauthorized access to certain assignment picture resources or functions, potentially exposing sensitive educational content or user data, but without broader system compromise or service disruption.

Potential Impact

For European organizations using Frappe LMS 2.35.0, this vulnerability poses a risk of unauthorized access to assignment-related files or data, which could lead to leakage of sensitive educational materials or personal information of students and staff. While the impact on confidentiality is low and no integrity or availability impacts are noted, the exposure of educational content could violate data protection regulations such as GDPR, leading to reputational damage and potential regulatory penalties. The high attack complexity and lack of known exploits reduce immediate risk, but the presence of a public exploit means motivated attackers could eventually leverage this vulnerability. Educational institutions, training providers, and organizations relying on Frappe LMS for learning management in Europe should be aware of this risk, especially those handling sensitive or regulated data.

Mitigation Recommendations

European organizations should prioritize upgrading Frappe LMS to a version that includes the vendor's security fixes once officially released and documented. In the interim, organizations can implement strict access controls on the /files/ directory and related assignment picture resources to restrict direct URL access only to authorized users. Web application firewalls (WAFs) can be configured to detect and block suspicious direct request patterns targeting the vulnerable component. Monitoring and logging access to assignment picture resources should be enhanced to detect anomalous activity. Additionally, organizations should conduct internal security assessments and penetration tests focusing on the LMS file handling components to identify any exploitation attempts. Communication with the vendor to obtain official patches and detailed remediation guidance is recommended. Finally, educating LMS administrators on secure configuration and timely patching is essential to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-04T09:22:22.603Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e1ea81930c1d4e7e6b5309

Added to database: 10/5/2025, 3:48:17 AM

Last enriched: 10/5/2025, 4:00:41 AM

Last updated: 10/7/2025, 11:22:46 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats