Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12270: Improper Control of Resource Identifiers in LearnHouse

0
Medium
VulnerabilityCVE-2025-12270cvecve-2025-12270
Published: Mon Oct 27 2025 (10/27/2025, 12:02:07 UTC)
Source: CVE Database V5
Product: LearnHouse

Description

A vulnerability was determined in LearnHouse up to 98dfad76aad70711a8113f6c1fdabfccf10509ca. The impacted element is an unknown function of the file /api/v1/assignments/{assignment_id}/tasks/{task_id}/sub_file of the component Student Assignment Submission Handler. This manipulation causes improper control of resource identifiers. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/27/2025, 12:08:47 UTC

Technical Analysis

CVE-2025-12270 identifies a vulnerability in the LearnHouse e-learning platform, specifically within the Student Assignment Submission Handler component. The flaw resides in an API endpoint at /api/v1/assignments/{assignment_id}/tasks/{task_id}/sub_file, where improper control of resource identifiers allows attackers to manipulate identifiers remotely. This can lead to unauthorized access or modification of assignment-related resources. The vulnerability requires no user interaction and no authentication, making it accessible to remote attackers with low attack complexity. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) reflects network attack vector, low complexity, no privileges required, no user interaction, and partial impact on confidentiality. The vendor uses continuous delivery with rolling releases, complicating patch management and version tracking. Despite early vendor notification, no response or patch has been issued. While no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation. The vulnerability could allow attackers to access or manipulate student assignment data, potentially undermining data integrity and confidentiality within educational environments.

Potential Impact

For European organizations, particularly educational institutions using LearnHouse, this vulnerability poses risks of unauthorized data access and manipulation of student assignments. Confidentiality could be compromised if attackers access sensitive student information or grades. Integrity may be affected if assignment submissions or task files are altered maliciously, potentially impacting academic evaluations. Availability impact is minimal as the vulnerability does not directly enable denial-of-service conditions. The ease of exploitation (no authentication or user interaction required) increases the threat level, especially in environments with exposed or poorly segmented APIs. The continuous delivery model and lack of vendor response may delay remediation, prolonging exposure. This could lead to reputational damage, regulatory compliance issues under GDPR due to data breaches, and operational disruptions in academic workflows. Institutions with limited cybersecurity resources may be particularly vulnerable to exploitation attempts.

Mitigation Recommendations

Organizations should implement strict validation and sanitization of resource identifiers at the API level to prevent unauthorized manipulation. Employing robust access control mechanisms, such as role-based access control (RBAC) and least privilege principles, can limit exposure. Network segmentation and firewall rules should restrict access to the vulnerable API endpoints to trusted internal networks or VPNs. Monitoring and logging API usage can help detect anomalous access patterns indicative of exploitation attempts. Given the vendor's lack of response, organizations should consider deploying Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting the affected endpoint. Regular security assessments and penetration testing focused on API security are recommended. Additionally, organizations should prepare incident response plans specific to potential data integrity or confidentiality breaches related to this vulnerability. Engaging with the vendor or community for updates and patches remains important, alongside exploring alternative platforms if remediation is delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T16:01:00.403Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff6099ba6dffc5e2ea03fe

Added to database: 10/27/2025, 12:07:53 PM

Last enriched: 10/27/2025, 12:08:47 PM

Last updated: 10/27/2025, 2:11:32 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats