Skip to main content

CVE-2025-46204: n/a

Medium
VulnerabilityCVE-2025-46204cvecve-2025-46204
Published: Wed Jun 04 2025 (06/04/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue in Unifiedtransform v2.0 allows a remote attacker to escalate privileges via the /course/edit/{id} endpoint.

AI-Powered Analysis

AILast updated: 07/07/2025, 02:42:47 UTC

Technical Analysis

CVE-2025-46204 is a medium-severity vulnerability identified in Unifiedtransform version 2.0, which allows a remote attacker to escalate privileges via the /course/edit/{id} endpoint. The vulnerability is classified under CWE-266, which relates to improper privilege management. Specifically, the flaw enables an unauthenticated attacker (as indicated by the CVSS vector with PR:N and UI:N) to gain elevated privileges without user interaction, exploiting a lack of proper access control on the specified endpoint. The CVSS score of 6.5 reflects a moderate risk, with the attack vector being network-based (AV:N) and low attack complexity (AC:L). The vulnerability impacts confidentiality and integrity, allowing unauthorized modification or access to course editing functions, but does not affect availability. No known exploits are currently reported in the wild, and no patches or vendor details are provided, indicating that mitigation may require custom controls or monitoring until official fixes are available.

Potential Impact

For European organizations, especially those in education, training, or e-learning sectors using Unifiedtransform or similar platforms, this vulnerability could lead to unauthorized privilege escalation, allowing attackers to modify course content or access sensitive educational data. This could result in data breaches, manipulation of educational materials, and loss of trust from users and stakeholders. The confidentiality and integrity of educational records and course information are at risk, potentially causing regulatory compliance issues under GDPR if personal data is exposed or altered. The lack of availability impact reduces the risk of service disruption but does not diminish the threat to data security and operational integrity.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should implement strict network-level access controls to restrict access to the /course/edit/{id} endpoint, such as IP whitelisting or VPN requirements. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting this endpoint. Conduct thorough access control audits and enforce the principle of least privilege on all course management interfaces. Monitor logs for unusual activity related to course editing functions and establish incident response procedures to quickly address potential exploitation attempts. Additionally, organizations should engage with the software vendor or community to obtain patches or updates and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6840c579182aa0cae2c16b07

Added to database: 6/4/2025, 10:15:21 PM

Last enriched: 7/7/2025, 2:42:47 AM

Last updated: 7/14/2025, 10:30:15 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats