CVE-2025-64366: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Stylemix MasterStudy LMS
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stylemix MasterStudy LMS masterstudy-lms-learning-management-system allows Blind SQL Injection.This issue affects MasterStudy LMS: from n/a through <= 3.6.27.
AI Analysis
Technical Summary
CVE-2025-64366 is a Blind SQL Injection vulnerability found in the Stylemix MasterStudy Learning Management System (LMS) affecting versions up to and including 3.6.27. The root cause is improper neutralization of special elements in SQL commands, which allows an attacker to inject malicious SQL queries remotely over the network without requiring user interaction. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), making it easier to exploit by authenticated users with limited access. The attack vector is network-based (AV:N), meaning exploitation can be performed remotely. The impact is primarily on confidentiality (C:H), with partial impacts on integrity (I:L) and availability (A:L), indicating that attackers can extract sensitive data and potentially alter or disrupt data to a limited extent. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on this LMS for managing educational content and user data. The lack of available patches at the time of disclosure increases the urgency for mitigation. The vulnerability is cataloged with a CVSS v3.1 score of 7.6, reflecting its high severity. The LMS is widely used in educational institutions and corporate training environments, making the potential attack surface substantial.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for universities, schools, and corporate training providers using MasterStudy LMS. Confidentiality breaches could expose sensitive student or employee data, including personal information and academic records, leading to privacy violations under GDPR. Partial integrity compromise could allow attackers to manipulate course content or user data, undermining trust and operational reliability. Availability impacts, though limited, could disrupt learning activities. The remote exploitability without user interaction and low privilege requirements increase the risk of insider threats or compromised accounts being leveraged for attacks. This could lead to reputational damage, regulatory fines, and operational disruptions. Organizations with large-scale deployments or integrations with other systems may face cascading effects. The absence of known exploits currently provides a window for proactive defense, but the high severity score demands urgent attention.
Mitigation Recommendations
Organizations should immediately inventory their MasterStudy LMS deployments to identify affected versions (<= 3.6.27). Until patches are released, apply strict input validation and sanitization on all user-supplied data interacting with the LMS database. Limit database user privileges to the minimum necessary to reduce the impact of potential injection. Monitor logs for unusual SQL query patterns or failed login attempts indicative of exploitation attempts. Employ Web Application Firewalls (WAFs) with rules targeting SQL injection signatures specific to MasterStudy LMS. Educate administrators and users about the risk and encourage strong authentication practices to prevent account compromise. Once patches are available from Stylemix, prioritize their deployment. Consider network segmentation to isolate LMS systems and restrict access to trusted users only. Regularly back up LMS data and test restoration procedures to mitigate availability risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-64366: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Stylemix MasterStudy LMS
Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stylemix MasterStudy LMS masterstudy-lms-learning-management-system allows Blind SQL Injection.This issue affects MasterStudy LMS: from n/a through <= 3.6.27.
AI-Powered Analysis
Technical Analysis
CVE-2025-64366 is a Blind SQL Injection vulnerability found in the Stylemix MasterStudy Learning Management System (LMS) affecting versions up to and including 3.6.27. The root cause is improper neutralization of special elements in SQL commands, which allows an attacker to inject malicious SQL queries remotely over the network without requiring user interaction. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), making it easier to exploit by authenticated users with limited access. The attack vector is network-based (AV:N), meaning exploitation can be performed remotely. The impact is primarily on confidentiality (C:H), with partial impacts on integrity (I:L) and availability (A:L), indicating that attackers can extract sensitive data and potentially alter or disrupt data to a limited extent. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on this LMS for managing educational content and user data. The lack of available patches at the time of disclosure increases the urgency for mitigation. The vulnerability is cataloged with a CVSS v3.1 score of 7.6, reflecting its high severity. The LMS is widely used in educational institutions and corporate training environments, making the potential attack surface substantial.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for universities, schools, and corporate training providers using MasterStudy LMS. Confidentiality breaches could expose sensitive student or employee data, including personal information and academic records, leading to privacy violations under GDPR. Partial integrity compromise could allow attackers to manipulate course content or user data, undermining trust and operational reliability. Availability impacts, though limited, could disrupt learning activities. The remote exploitability without user interaction and low privilege requirements increase the risk of insider threats or compromised accounts being leveraged for attacks. This could lead to reputational damage, regulatory fines, and operational disruptions. Organizations with large-scale deployments or integrations with other systems may face cascading effects. The absence of known exploits currently provides a window for proactive defense, but the high severity score demands urgent attention.
Mitigation Recommendations
Organizations should immediately inventory their MasterStudy LMS deployments to identify affected versions (<= 3.6.27). Until patches are released, apply strict input validation and sanitization on all user-supplied data interacting with the LMS database. Limit database user privileges to the minimum necessary to reduce the impact of potential injection. Monitor logs for unusual SQL query patterns or failed login attempts indicative of exploitation attempts. Employ Web Application Firewalls (WAFs) with rules targeting SQL injection signatures specific to MasterStudy LMS. Educate administrators and users about the risk and encourage strong authentication practices to prevent account compromise. Once patches are available from Stylemix, prioritize their deployment. Consider network segmentation to isolate LMS systems and restrict access to trusted users only. Regularly back up LMS data and test restoration procedures to mitigate availability risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-31T11:23:15.210Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6904a350479ed964d8ea1f0d
Added to database: 10/31/2025, 11:53:52 AM
Last enriched: 11/13/2025, 1:11:42 PM
Last updated: 12/15/2025, 4:53:46 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14703: Improper Authentication in Shiguangwu sgwbox N3
MediumCVE-2025-14698: Path Traversal in atlaszz AI Photo Team Galleryit App
MediumCVE-2025-14697: Files or Directories Accessible in Shenzhen Sixun Software Sixun Shanghui Group Business Management System
MediumCVE-2025-67907
UnknownCVE-2025-14702: Path Traversal in Smartbit CommV Smartschool App
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.