Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64366: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Stylemix MasterStudy LMS

0
High
VulnerabilityCVE-2025-64366cvecve-2025-64366
Published: Fri Oct 31 2025 (10/31/2025, 11:42:39 UTC)
Source: CVE Database V5
Vendor/Project: Stylemix
Product: MasterStudy LMS

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stylemix MasterStudy LMS masterstudy-lms-learning-management-system allows Blind SQL Injection.This issue affects MasterStudy LMS: from n/a through <= 3.6.27.

AI-Powered Analysis

AILast updated: 11/13/2025, 13:11:42 UTC

Technical Analysis

CVE-2025-64366 is a Blind SQL Injection vulnerability found in the Stylemix MasterStudy Learning Management System (LMS) affecting versions up to and including 3.6.27. The root cause is improper neutralization of special elements in SQL commands, which allows an attacker to inject malicious SQL queries remotely over the network without requiring user interaction. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), making it easier to exploit by authenticated users with limited access. The attack vector is network-based (AV:N), meaning exploitation can be performed remotely. The impact is primarily on confidentiality (C:H), with partial impacts on integrity (I:L) and availability (A:L), indicating that attackers can extract sensitive data and potentially alter or disrupt data to a limited extent. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on this LMS for managing educational content and user data. The lack of available patches at the time of disclosure increases the urgency for mitigation. The vulnerability is cataloged with a CVSS v3.1 score of 7.6, reflecting its high severity. The LMS is widely used in educational institutions and corporate training environments, making the potential attack surface substantial.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for universities, schools, and corporate training providers using MasterStudy LMS. Confidentiality breaches could expose sensitive student or employee data, including personal information and academic records, leading to privacy violations under GDPR. Partial integrity compromise could allow attackers to manipulate course content or user data, undermining trust and operational reliability. Availability impacts, though limited, could disrupt learning activities. The remote exploitability without user interaction and low privilege requirements increase the risk of insider threats or compromised accounts being leveraged for attacks. This could lead to reputational damage, regulatory fines, and operational disruptions. Organizations with large-scale deployments or integrations with other systems may face cascading effects. The absence of known exploits currently provides a window for proactive defense, but the high severity score demands urgent attention.

Mitigation Recommendations

Organizations should immediately inventory their MasterStudy LMS deployments to identify affected versions (<= 3.6.27). Until patches are released, apply strict input validation and sanitization on all user-supplied data interacting with the LMS database. Limit database user privileges to the minimum necessary to reduce the impact of potential injection. Monitor logs for unusual SQL query patterns or failed login attempts indicative of exploitation attempts. Employ Web Application Firewalls (WAFs) with rules targeting SQL injection signatures specific to MasterStudy LMS. Educate administrators and users about the risk and encourage strong authentication practices to prevent account compromise. Once patches are available from Stylemix, prioritize their deployment. Consider network segmentation to isolate LMS systems and restrict access to trusted users only. Regularly back up LMS data and test restoration procedures to mitigate availability risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:23:15.210Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6904a350479ed964d8ea1f0d

Added to database: 10/31/2025, 11:53:52 AM

Last enriched: 11/13/2025, 1:11:42 PM

Last updated: 12/15/2025, 4:53:46 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats