Skip to main content

CVE-2025-46101: n/a

High
VulnerabilityCVE-2025-46101cvecve-2025-46101
Published: Mon Jun 23 2025 (06/23/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

SQL Injection vulnerability in Beakon Software Beakon Learning Management System Sharable Content Object Reference Model (SCORM) version before 5.4.3 allows a remote attacker to obtain sensitive information via the ks parameter in json_scorm.php file

AI-Powered Analysis

AILast updated: 06/23/2025, 15:02:34 UTC

Technical Analysis

CVE-2025-46101 is a SQL Injection vulnerability identified in the Beakon Software Beakon Learning Management System (LMS), specifically affecting versions prior to 5.4.3. The vulnerability resides in the json_scorm.php file, where the 'ks' parameter is improperly sanitized, allowing a remote attacker to inject malicious SQL code. This injection flaw enables unauthorized access to the backend database, potentially exposing sensitive information stored within the LMS. Since the vulnerability is triggered remotely without requiring authentication, an attacker can exploit it simply by sending crafted requests to the vulnerable endpoint. The SCORM (Sharable Content Object Reference Model) component is widely used in e-learning platforms to manage and deliver educational content, making this vulnerability particularly critical for organizations relying on Beakon LMS for training and educational services. Although no known exploits are currently reported in the wild, the lack of a patch at the time of publication increases the risk of exploitation. The vulnerability impacts confidentiality by allowing data disclosure, and potentially integrity if attackers manipulate database queries. Availability impact is less direct but could occur if exploitation leads to database corruption or denial of service. The absence of a CVSS score necessitates an assessment based on the technical details and potential impact.

Potential Impact

For European organizations, the exploitation of this SQL Injection vulnerability could lead to unauthorized disclosure of sensitive educational data, including user credentials, personal information, and proprietary training materials. This exposure risks violating data protection regulations such as the GDPR, leading to legal and financial repercussions. Educational institutions, corporate training departments, and government agencies using Beakon LMS could face operational disruptions and reputational damage. The breach of LMS data could also facilitate further attacks, such as credential stuffing or phishing campaigns targeting users. Given the remote and unauthenticated nature of the exploit, attackers can operate stealthily, increasing the threat level. The impact extends beyond confidentiality to potential integrity issues if attackers modify or delete LMS content or user records. While direct availability impact is less evident, extensive exploitation could degrade system performance or cause outages, affecting critical training and compliance programs.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading Beakon LMS to version 5.4.3 or later as soon as the patch becomes available. In the interim, organizations should implement web application firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'ks' parameter in json_scorm.php. Conduct thorough input validation and sanitization on all user-supplied parameters, especially those interacting with the database. Employ least privilege principles for database accounts used by the LMS to limit the scope of data exposure in case of compromise. Regularly audit LMS logs for unusual access patterns or failed SQL queries indicative of attempted exploitation. Additionally, segment the LMS infrastructure within the network to restrict lateral movement if an attacker gains access. Educate LMS administrators and users about the risks and signs of exploitation attempts. Finally, maintain up-to-date backups of LMS data to enable recovery in case of data integrity issues or ransomware attacks following exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68596b43b023ea275d7debf9

Added to database: 6/23/2025, 2:57:07 PM

Last enriched: 6/23/2025, 3:02:34 PM

Last updated: 6/23/2025, 7:41:43 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats