CVE-2025-64705: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in frappe lms
Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.
AI Analysis
Technical Summary
CVE-2025-64705 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Frappe Learning Management System (LMS). The flaw exists in versions starting from 2.0.0 up to but not including 2.41.0, where users with limited privileges could access submissions made by other students. This occurs due to improper enforcement of role-based access controls and lack of adequate redirection when accessing submission URLs directly. The vulnerability allows unauthorized disclosure of student submission data, violating confidentiality principles. The issue does not require authentication beyond a limited privilege user and does not need user interaction, making it remotely exploitable with low complexity. The vendor addressed the vulnerability in version 2.41.0 by implementing proper role checks and redirecting unauthorized access attempts to prevent exposure. No known exploits are reported in the wild as of the publication date. The CVSS v4.0 score is 1.3, reflecting low severity primarily due to limited impact scope and the requirement for at least limited privileges. However, the exposure of sensitive educational data can have compliance and privacy implications, especially in jurisdictions with strict data protection laws. The vulnerability highlights the importance of robust access control mechanisms in LMS platforms to protect student data confidentiality.
Potential Impact
For European organizations, particularly educational institutions and training providers using Frappe LMS versions between 2.0.0 and 2.41.0, this vulnerability poses a risk of unauthorized disclosure of student submissions. Such exposure can lead to breaches of student privacy, potential violations of the EU General Data Protection Regulation (GDPR), and reputational damage. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could undermine trust in the LMS platform and the institution's data handling practices. In regulated environments, this could trigger compliance audits or penalties. The impact is more pronounced in countries with stringent data protection enforcement and where educational data is considered highly sensitive. The vulnerability could also facilitate academic dishonesty if students access peers’ submissions, affecting the integrity of assessments indirectly. While no active exploitation is known, the ease of access via direct URLs without proper authorization checks increases the risk of opportunistic data exposure.
Mitigation Recommendations
European organizations should immediately upgrade Frappe LMS to version 2.41.0 or later, where the vulnerability is fixed by enforcing proper role-based access controls and redirecting unauthorized access attempts. Until upgrading is possible, administrators should audit user permissions to minimize the number of users with submission access and monitor access logs for suspicious activity involving direct URL access to submissions. Implementing web application firewalls (WAFs) with rules to detect and block unauthorized access patterns to submission URLs can provide temporary protection. Additionally, organizations should conduct internal security reviews of LMS configurations and educate users about the risks of sharing direct URLs. Regularly applying security patches and maintaining an inventory of LMS versions deployed across the organization will help prevent similar issues. For compliance, documenting the mitigation steps and any data exposure incidents is advisable. Finally, consider integrating more granular access control mechanisms or multi-factor authentication for LMS access to reduce unauthorized data exposure risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2025-64705: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in frappe lms
Description
Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.
AI-Powered Analysis
Technical Analysis
CVE-2025-64705 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Frappe Learning Management System (LMS). The flaw exists in versions starting from 2.0.0 up to but not including 2.41.0, where users with limited privileges could access submissions made by other students. This occurs due to improper enforcement of role-based access controls and lack of adequate redirection when accessing submission URLs directly. The vulnerability allows unauthorized disclosure of student submission data, violating confidentiality principles. The issue does not require authentication beyond a limited privilege user and does not need user interaction, making it remotely exploitable with low complexity. The vendor addressed the vulnerability in version 2.41.0 by implementing proper role checks and redirecting unauthorized access attempts to prevent exposure. No known exploits are reported in the wild as of the publication date. The CVSS v4.0 score is 1.3, reflecting low severity primarily due to limited impact scope and the requirement for at least limited privileges. However, the exposure of sensitive educational data can have compliance and privacy implications, especially in jurisdictions with strict data protection laws. The vulnerability highlights the importance of robust access control mechanisms in LMS platforms to protect student data confidentiality.
Potential Impact
For European organizations, particularly educational institutions and training providers using Frappe LMS versions between 2.0.0 and 2.41.0, this vulnerability poses a risk of unauthorized disclosure of student submissions. Such exposure can lead to breaches of student privacy, potential violations of the EU General Data Protection Regulation (GDPR), and reputational damage. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could undermine trust in the LMS platform and the institution's data handling practices. In regulated environments, this could trigger compliance audits or penalties. The impact is more pronounced in countries with stringent data protection enforcement and where educational data is considered highly sensitive. The vulnerability could also facilitate academic dishonesty if students access peers’ submissions, affecting the integrity of assessments indirectly. While no active exploitation is known, the ease of access via direct URLs without proper authorization checks increases the risk of opportunistic data exposure.
Mitigation Recommendations
European organizations should immediately upgrade Frappe LMS to version 2.41.0 or later, where the vulnerability is fixed by enforcing proper role-based access controls and redirecting unauthorized access attempts. Until upgrading is possible, administrators should audit user permissions to minimize the number of users with submission access and monitor access logs for suspicious activity involving direct URL access to submissions. Implementing web application firewalls (WAFs) with rules to detect and block unauthorized access patterns to submission URLs can provide temporary protection. Additionally, organizations should conduct internal security reviews of LMS configurations and educate users about the risks of sharing direct URLs. Regularly applying security patches and maintaining an inventory of LMS versions deployed across the organization will help prevent similar issues. For compliance, documenting the mitigation steps and any data exposure incidents is advisable. Finally, consider integrating more granular access control mechanisms or multi-factor authentication for LMS access to reduce unauthorized data exposure risks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.921Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69150c3912715e9af455a309
Added to database: 11/12/2025, 10:37:45 PM
Last enriched: 11/19/2025, 11:17:28 PM
Last updated: 12/28/2025, 2:49:50 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14177: CWE-125 Out-of-bounds Read in PHP Group PHP
MediumCVE-2025-14180: CWE-476 NULL Pointer Dereference in PHP Group PHP
HighCVE-2025-14178: CWE-787 Out-of-bounds Write in PHP Group PHP
MediumCVE-2025-15109: Unrestricted Upload in jackq XCMS
MediumCVE-2025-15108: Use of Hard-coded Cryptographic Key in PandaXGO PandaX
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.