Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62158: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in frappe lms

0
Low
VulnerabilityCVE-2025-62158cvecve-2025-62158cwe-200
Published: Fri Oct 10 2025 (10/10/2025, 20:05:38 UTC)
Source: CVE Database V5
Vendor/Project: frappe
Product: lms

Description

Frappe Learning is a learning system that helps users structure their content. In versions prior to 2.38.0, the system did stored the attachments uploaded by the students in their assignments as public files. This issue potentially exposed student-uploaded files to the public. Anyone with the file URL could access these files without authentication. The issue has been fixed in version 2.38.0 by ensuring all student-uploaded assignment attachments are stored as private files by default.

AI-Powered Analysis

AILast updated: 10/10/2025, 20:22:16 UTC

Technical Analysis

CVE-2025-62158 identifies a vulnerability in the Frappe Learning Management System (LMS) prior to version 2.38.0, where student-uploaded assignment attachments were inadvertently stored as public files. This storage misconfiguration meant that any individual with knowledge of the file URL could access these files without any authentication or authorization checks, leading to an exposure of sensitive student data. The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The root cause was the default file storage setting that did not enforce privacy on uploaded attachments. The issue was corrected in version 2.38.0 by ensuring that all student-uploaded assignment files are stored as private by default, restricting access only to authorized users. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U) indicates that the vulnerability is remotely exploitable without authentication or user interaction, but the impact on confidentiality is low, and there is no impact on integrity or availability. No known exploits have been reported in the wild, suggesting limited active exploitation. The vulnerability primarily affects confidentiality by exposing potentially sensitive student data, such as personal documents or assignment content, to unauthorized parties who can guess or discover the file URLs. The scope is limited to organizations using affected versions of Frappe LMS, particularly educational institutions managing student assignments. Since the vulnerability does not allow modification or deletion of data, the overall risk is considered low but still significant for privacy compliance and data protection.

Potential Impact

For European organizations, particularly educational institutions using Frappe LMS versions prior to 2.38.0, this vulnerability poses a risk to the confidentiality of student data. Exposure of student-uploaded files could lead to privacy violations, potential breaches of GDPR regulations, and reputational damage. Although the vulnerability does not affect data integrity or system availability, unauthorized access to sensitive educational content or personal information could result in compliance penalties and loss of trust. The impact is more pronounced in institutions with large student populations or those handling sensitive or regulated educational content. Since the vulnerability requires no authentication and no user interaction, any attacker with knowledge or discovery of file URLs can access the data, increasing the risk of data leakage. However, the absence of known exploits in the wild and the low CVSS score suggest that the threat is currently limited but should not be ignored given the sensitivity of educational data and regulatory environment in Europe.

Mitigation Recommendations

1. Upgrade all Frappe LMS installations to version 2.38.0 or later immediately to ensure that student-uploaded files are stored as private by default. 2. Conduct a thorough audit of existing file storage permissions to identify and remediate any publicly accessible student files uploaded prior to the patch. 3. Implement access controls and monitoring on file storage systems to detect unauthorized access attempts. 4. Educate system administrators and LMS users about secure file handling practices and the importance of protecting student data. 5. Review and update data privacy policies to ensure compliance with GDPR and other relevant regulations, emphasizing secure storage of student information. 6. Consider implementing URL access logging and anomaly detection to identify potential unauthorized file access. 7. Regularly review LMS configurations and updates to prevent similar misconfigurations in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-07T16:12:03.424Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e96ae14338e1ae7d7efb3e

Added to database: 10/10/2025, 8:21:53 PM

Last enriched: 10/10/2025, 8:22:16 PM

Last updated: 10/10/2025, 11:18:07 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats