CVE-2025-62158: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in frappe lms
Frappe Learning is a learning system that helps users structure their content. In versions prior to 2.38.0, the system did stored the attachments uploaded by the students in their assignments as public files. This issue potentially exposed student-uploaded files to the public. Anyone with the file URL could access these files without authentication. The issue has been fixed in version 2.38.0 by ensuring all student-uploaded assignment attachments are stored as private files by default.
AI Analysis
Technical Summary
CVE-2025-62158 identifies a vulnerability in the Frappe Learning Management System (LMS) prior to version 2.38.0, where student-uploaded assignment attachments were inadvertently stored as public files. This storage misconfiguration meant that any individual with knowledge of the file URL could access these files without any authentication or authorization checks, leading to an exposure of sensitive student data. The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The root cause was the default file storage setting that did not enforce privacy on uploaded attachments. The issue was corrected in version 2.38.0 by ensuring that all student-uploaded assignment files are stored as private by default, restricting access only to authorized users. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U) indicates that the vulnerability is remotely exploitable without authentication or user interaction, but the impact on confidentiality is low, and there is no impact on integrity or availability. No known exploits have been reported in the wild, suggesting limited active exploitation. The vulnerability primarily affects confidentiality by exposing potentially sensitive student data, such as personal documents or assignment content, to unauthorized parties who can guess or discover the file URLs. The scope is limited to organizations using affected versions of Frappe LMS, particularly educational institutions managing student assignments. Since the vulnerability does not allow modification or deletion of data, the overall risk is considered low but still significant for privacy compliance and data protection.
Potential Impact
For European organizations, particularly educational institutions using Frappe LMS versions prior to 2.38.0, this vulnerability poses a risk to the confidentiality of student data. Exposure of student-uploaded files could lead to privacy violations, potential breaches of GDPR regulations, and reputational damage. Although the vulnerability does not affect data integrity or system availability, unauthorized access to sensitive educational content or personal information could result in compliance penalties and loss of trust. The impact is more pronounced in institutions with large student populations or those handling sensitive or regulated educational content. Since the vulnerability requires no authentication and no user interaction, any attacker with knowledge or discovery of file URLs can access the data, increasing the risk of data leakage. However, the absence of known exploits in the wild and the low CVSS score suggest that the threat is currently limited but should not be ignored given the sensitivity of educational data and regulatory environment in Europe.
Mitigation Recommendations
1. Upgrade all Frappe LMS installations to version 2.38.0 or later immediately to ensure that student-uploaded files are stored as private by default. 2. Conduct a thorough audit of existing file storage permissions to identify and remediate any publicly accessible student files uploaded prior to the patch. 3. Implement access controls and monitoring on file storage systems to detect unauthorized access attempts. 4. Educate system administrators and LMS users about secure file handling practices and the importance of protecting student data. 5. Review and update data privacy policies to ensure compliance with GDPR and other relevant regulations, emphasizing secure storage of student information. 6. Consider implementing URL access logging and anomaly detection to identify potential unauthorized file access. 7. Regularly review LMS configurations and updates to prevent similar misconfigurations in the future.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Austria
CVE-2025-62158: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in frappe lms
Description
Frappe Learning is a learning system that helps users structure their content. In versions prior to 2.38.0, the system did stored the attachments uploaded by the students in their assignments as public files. This issue potentially exposed student-uploaded files to the public. Anyone with the file URL could access these files without authentication. The issue has been fixed in version 2.38.0 by ensuring all student-uploaded assignment attachments are stored as private files by default.
AI-Powered Analysis
Technical Analysis
CVE-2025-62158 identifies a vulnerability in the Frappe Learning Management System (LMS) prior to version 2.38.0, where student-uploaded assignment attachments were inadvertently stored as public files. This storage misconfiguration meant that any individual with knowledge of the file URL could access these files without any authentication or authorization checks, leading to an exposure of sensitive student data. The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The root cause was the default file storage setting that did not enforce privacy on uploaded attachments. The issue was corrected in version 2.38.0 by ensuring that all student-uploaded assignment files are stored as private by default, restricting access only to authorized users. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U) indicates that the vulnerability is remotely exploitable without authentication or user interaction, but the impact on confidentiality is low, and there is no impact on integrity or availability. No known exploits have been reported in the wild, suggesting limited active exploitation. The vulnerability primarily affects confidentiality by exposing potentially sensitive student data, such as personal documents or assignment content, to unauthorized parties who can guess or discover the file URLs. The scope is limited to organizations using affected versions of Frappe LMS, particularly educational institutions managing student assignments. Since the vulnerability does not allow modification or deletion of data, the overall risk is considered low but still significant for privacy compliance and data protection.
Potential Impact
For European organizations, particularly educational institutions using Frappe LMS versions prior to 2.38.0, this vulnerability poses a risk to the confidentiality of student data. Exposure of student-uploaded files could lead to privacy violations, potential breaches of GDPR regulations, and reputational damage. Although the vulnerability does not affect data integrity or system availability, unauthorized access to sensitive educational content or personal information could result in compliance penalties and loss of trust. The impact is more pronounced in institutions with large student populations or those handling sensitive or regulated educational content. Since the vulnerability requires no authentication and no user interaction, any attacker with knowledge or discovery of file URLs can access the data, increasing the risk of data leakage. However, the absence of known exploits in the wild and the low CVSS score suggest that the threat is currently limited but should not be ignored given the sensitivity of educational data and regulatory environment in Europe.
Mitigation Recommendations
1. Upgrade all Frappe LMS installations to version 2.38.0 or later immediately to ensure that student-uploaded files are stored as private by default. 2. Conduct a thorough audit of existing file storage permissions to identify and remediate any publicly accessible student files uploaded prior to the patch. 3. Implement access controls and monitoring on file storage systems to detect unauthorized access attempts. 4. Educate system administrators and LMS users about secure file handling practices and the importance of protecting student data. 5. Review and update data privacy policies to ensure compliance with GDPR and other relevant regulations, emphasizing secure storage of student information. 6. Consider implementing URL access logging and anomaly detection to identify potential unauthorized file access. 7. Regularly review LMS configurations and updates to prevent similar misconfigurations in the future.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-07T16:12:03.424Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e96ae14338e1ae7d7efb3e
Added to database: 10/10/2025, 8:21:53 PM
Last enriched: 10/10/2025, 8:22:16 PM
Last updated: 10/10/2025, 11:18:07 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11626: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
MediumCVE-2025-9554: Vulnerability in Drupal Owl Carousel 2
UnknownCVE-2025-9553: Vulnerability in Drupal API Key manager
UnknownCVE-2025-9552: Vulnerability in Drupal Synchronize composer.json With Contrib Modules
UnknownCVE-2025-9551: CWE-307 Improper Restriction of Excessive Authentication Attempts in Drupal Protected Pages
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.