Skip to main content

CVE-2025-54744: CWE-862 Missing Authorization in Stylemix MasterStudy LMS

Medium
VulnerabilityCVE-2025-54744cvecve-2025-54744cwe-862
Published: Fri Sep 05 2025 (09/05/2025, 16:15:39 UTC)
Source: CVE Database V5
Vendor/Project: Stylemix
Product: MasterStudy LMS

Description

Missing Authorization vulnerability in Stylemix MasterStudy LMS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MasterStudy LMS: from n/a through 3.6.15.

AI-Powered Analysis

AILast updated: 09/05/2025, 16:21:22 UTC

Technical Analysis

CVE-2025-54744 is a Missing Authorization vulnerability (CWE-862) identified in the Stylemix MasterStudy LMS product, affecting versions up to 3.6.15. This vulnerability arises from incorrectly configured access control mechanisms within the LMS platform, allowing users with limited privileges (low privilege requirement) to perform unauthorized actions that should be restricted. Specifically, the vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). Although no confidentiality impact is noted, the vulnerability has a high impact on integrity, meaning attackers can alter or manipulate data or system states without proper authorization. Availability is not affected. The vulnerability does not require elevated privileges beyond low-level privileges (PR:L), which implies that authenticated users with minimal permissions can exploit this flaw to escalate their capabilities or perform unauthorized modifications. The vulnerability is currently not known to be exploited in the wild, and no patches or fixes have been linked yet. The CVSS score of 6.5 (medium severity) reflects the moderate risk posed by this issue, balancing ease of exploitation and the impact on system integrity. The core technical issue is the failure to enforce proper authorization checks on sensitive operations or resources within the LMS, which could lead to unauthorized data manipulation or administrative actions by users who should not have such rights.

Potential Impact

For European organizations using Stylemix MasterStudy LMS, this vulnerability poses a significant risk to the integrity of their learning management systems. Unauthorized modification of course content, user data, grades, or administrative settings could disrupt educational processes, damage organizational reputation, and lead to compliance issues, especially under GDPR where data integrity and protection are critical. The lack of confidentiality impact reduces the risk of data leakage, but the ability to alter data without authorization can undermine trust in the LMS platform and potentially cause operational disruptions. Educational institutions, corporate training departments, and e-learning providers across Europe relying on this LMS could face unauthorized changes that affect course delivery and certification validity. Given the remote exploitability and low complexity, attackers could automate exploitation attempts, increasing the threat level. Although no known exploits exist yet, the medium severity score and the nature of the vulnerability warrant proactive mitigation to prevent future attacks.

Mitigation Recommendations

European organizations should immediately audit their MasterStudy LMS deployments to identify affected versions (up to 3.6.15) and restrict access to the LMS to trusted users only. Implement strict role-based access control (RBAC) policies and review user permissions to ensure minimal privilege principles are enforced. Monitor LMS logs for unusual activities indicative of unauthorized access or data modification attempts. Since no official patches are currently available, consider applying temporary compensating controls such as network-level restrictions (e.g., IP whitelisting), multi-factor authentication (MFA) for all LMS users, and enhanced monitoring with alerting on suspicious behavior. Engage with Stylemix support or community channels to track patch releases and apply updates promptly once available. Additionally, conduct penetration testing focused on authorization checks within the LMS to identify and remediate any other potential access control weaknesses. Document and communicate the risk to stakeholders to ensure awareness and preparedness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-07-28T10:56:41.543Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bb0d9ee11b59d9ac04ed55

Added to database: 9/5/2025, 4:19:42 PM

Last enriched: 9/5/2025, 4:21:22 PM

Last updated: 9/5/2025, 8:04:45 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats