CVE-2025-46101: n/a
SQL Injection vulnerability in Beakon Software Beakon Learning Management System Sharable Content Object Reference Model (SCORM) version before 5.4.3 allows a remote attacker to obtain sensitive information via the ks parameter in json_scorm.php file
AI Analysis
Technical Summary
CVE-2025-46101 is a SQL Injection vulnerability identified in the Beakon Software Beakon Learning Management System (LMS), specifically affecting versions prior to 5.4.3. The vulnerability resides in the json_scorm.php file, where the 'ks' parameter is improperly sanitized, allowing a remote attacker to inject malicious SQL code. This injection flaw enables unauthorized access to the backend database, potentially exposing sensitive information stored within the LMS. Since the vulnerability is triggered remotely without requiring authentication, an attacker can exploit it simply by sending crafted requests to the vulnerable endpoint. The SCORM (Sharable Content Object Reference Model) component is widely used in e-learning platforms to manage and deliver educational content, making this vulnerability particularly critical for organizations relying on Beakon LMS for training and educational services. Although no known exploits are currently reported in the wild, the lack of a patch at the time of publication increases the risk of exploitation. The vulnerability impacts confidentiality by allowing data disclosure, and potentially integrity if attackers manipulate database queries. Availability impact is less direct but could occur if exploitation leads to database corruption or denial of service. The absence of a CVSS score necessitates an assessment based on the technical details and potential impact.
Potential Impact
For European organizations, the exploitation of this SQL Injection vulnerability could lead to unauthorized disclosure of sensitive educational data, including user credentials, personal information, and proprietary training materials. This exposure risks violating data protection regulations such as the GDPR, leading to legal and financial repercussions. Educational institutions, corporate training departments, and government agencies using Beakon LMS could face operational disruptions and reputational damage. The breach of LMS data could also facilitate further attacks, such as credential stuffing or phishing campaigns targeting users. Given the remote and unauthenticated nature of the exploit, attackers can operate stealthily, increasing the threat level. The impact extends beyond confidentiality to potential integrity issues if attackers modify or delete LMS content or user records. While direct availability impact is less evident, extensive exploitation could degrade system performance or cause outages, affecting critical training and compliance programs.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading Beakon LMS to version 5.4.3 or later as soon as the patch becomes available. In the interim, organizations should implement web application firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'ks' parameter in json_scorm.php. Conduct thorough input validation and sanitization on all user-supplied parameters, especially those interacting with the database. Employ least privilege principles for database accounts used by the LMS to limit the scope of data exposure in case of compromise. Regularly audit LMS logs for unusual access patterns or failed SQL queries indicative of attempted exploitation. Additionally, segment the LMS infrastructure within the network to restrict lateral movement if an attacker gains access. Educate LMS administrators and users about the risks and signs of exploitation attempts. Finally, maintain up-to-date backups of LMS data to enable recovery in case of data integrity issues or ransomware attacks following exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-46101: n/a
Description
SQL Injection vulnerability in Beakon Software Beakon Learning Management System Sharable Content Object Reference Model (SCORM) version before 5.4.3 allows a remote attacker to obtain sensitive information via the ks parameter in json_scorm.php file
AI-Powered Analysis
Technical Analysis
CVE-2025-46101 is a SQL Injection vulnerability identified in the Beakon Software Beakon Learning Management System (LMS), specifically affecting versions prior to 5.4.3. The vulnerability resides in the json_scorm.php file, where the 'ks' parameter is improperly sanitized, allowing a remote attacker to inject malicious SQL code. This injection flaw enables unauthorized access to the backend database, potentially exposing sensitive information stored within the LMS. Since the vulnerability is triggered remotely without requiring authentication, an attacker can exploit it simply by sending crafted requests to the vulnerable endpoint. The SCORM (Sharable Content Object Reference Model) component is widely used in e-learning platforms to manage and deliver educational content, making this vulnerability particularly critical for organizations relying on Beakon LMS for training and educational services. Although no known exploits are currently reported in the wild, the lack of a patch at the time of publication increases the risk of exploitation. The vulnerability impacts confidentiality by allowing data disclosure, and potentially integrity if attackers manipulate database queries. Availability impact is less direct but could occur if exploitation leads to database corruption or denial of service. The absence of a CVSS score necessitates an assessment based on the technical details and potential impact.
Potential Impact
For European organizations, the exploitation of this SQL Injection vulnerability could lead to unauthorized disclosure of sensitive educational data, including user credentials, personal information, and proprietary training materials. This exposure risks violating data protection regulations such as the GDPR, leading to legal and financial repercussions. Educational institutions, corporate training departments, and government agencies using Beakon LMS could face operational disruptions and reputational damage. The breach of LMS data could also facilitate further attacks, such as credential stuffing or phishing campaigns targeting users. Given the remote and unauthenticated nature of the exploit, attackers can operate stealthily, increasing the threat level. The impact extends beyond confidentiality to potential integrity issues if attackers modify or delete LMS content or user records. While direct availability impact is less evident, extensive exploitation could degrade system performance or cause outages, affecting critical training and compliance programs.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading Beakon LMS to version 5.4.3 or later as soon as the patch becomes available. In the interim, organizations should implement web application firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'ks' parameter in json_scorm.php. Conduct thorough input validation and sanitization on all user-supplied parameters, especially those interacting with the database. Employ least privilege principles for database accounts used by the LMS to limit the scope of data exposure in case of compromise. Regularly audit LMS logs for unusual access patterns or failed SQL queries indicative of attempted exploitation. Additionally, segment the LMS infrastructure within the network to restrict lateral movement if an attacker gains access. Educate LMS administrators and users about the risks and signs of exploitation attempts. Finally, maintain up-to-date backups of LMS data to enable recovery in case of data integrity issues or ransomware attacks following exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68596b43b023ea275d7debf9
Added to database: 6/23/2025, 2:57:07 PM
Last enriched: 6/23/2025, 3:02:34 PM
Last updated: 6/23/2025, 7:41:43 PM
Views: 4
Related Threats
CVE-2025-6412: SQL Injection in PHPGurukul Art Gallery Management System
MediumCVE-2025-6305: SQL Injection in code-projects Online Shoe Store
MediumCVE-2025-6304: SQL Injection in code-projects Online Shoe Store
MediumCVE-2025-6286: Open Redirect in PHPGurukul COVID19 Testing Management System
MediumCVE-2025-6285: Cross Site Scripting in PHPGurukul COVID19 Testing Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.