Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64705: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in frappe lms

0
Low
VulnerabilityCVE-2025-64705cvecve-2025-64705cwe-200
Published: Wed Nov 12 2025 (11/12/2025, 22:25:49 UTC)
Source: CVE Database V5
Vendor/Project: frappe
Product: lms

Description

Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.

AI-Powered Analysis

AILast updated: 11/12/2025, 22:37:59 UTC

Technical Analysis

CVE-2025-64705 identifies a vulnerability in the Frappe Learning Management System (LMS) affecting versions from 2.0.0 up to 2.41.0. The core issue is an exposure of sensitive information (CWE-200) where users could access submissions made by other students without proper authorization. This occurs because the system did not enforce adequate role-based access controls and allowed direct URL access to submission data without redirecting unauthorized users. The vulnerability compromises confidentiality by exposing student submissions to unauthorized actors but does not impact system integrity or availability. The flaw can be exploited remotely over the network without user interaction, requiring only limited privileges, which may be granted to enrolled users or authenticated students. The vulnerability was addressed in version 2.41.0 by implementing stricter role checks and redirecting unauthorized access attempts to prevent direct URL exploitation. No known exploits are currently in the wild, and the CVSS v4.0 base score is 1.3, reflecting low severity due to limited impact and exploitation complexity. The vulnerability highlights the importance of enforcing strict access controls in LMS platforms to protect sensitive educational data from unauthorized disclosure.

Potential Impact

For European organizations, particularly educational institutions using Frappe LMS, this vulnerability poses a risk of unauthorized disclosure of student submissions, potentially violating data protection regulations such as GDPR. Exposure of student work could lead to privacy breaches, reputational damage, and loss of trust. Although the impact is limited to confidentiality and does not affect system availability or integrity, the sensitivity of educational data makes this exposure significant. Institutions that have not updated to version 2.41.0 or later remain vulnerable. The risk is higher in countries with widespread adoption of Frappe LMS or similar open-source LMS platforms. Additionally, educational institutions often handle large volumes of personal data, increasing the potential impact of such leaks. While no active exploitation has been reported, attackers could leverage this vulnerability to gather sensitive academic information or conduct further social engineering attacks.

Mitigation Recommendations

The primary mitigation is to upgrade all affected Frappe LMS instances to version 2.41.0 or later, where the vulnerability is fixed. Organizations should verify that role-based access controls are correctly configured and enforced, ensuring that users can only access their own submissions. Conduct thorough audits of URL access patterns to detect and block unauthorized direct URL access attempts. Implement monitoring and alerting for unusual access to submission data. Educate administrators and users about the importance of access control and the risks of sharing URLs. If immediate upgrade is not possible, consider implementing web application firewalls (WAFs) with rules to restrict access to submission URLs based on user roles. Regularly review and test LMS security configurations to prevent similar issues. Finally, ensure compliance with data protection laws by documenting the vulnerability response and notifying affected individuals if data exposure is confirmed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.921Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69150c3912715e9af455a309

Added to database: 11/12/2025, 10:37:45 PM

Last enriched: 11/12/2025, 10:37:59 PM

Last updated: 11/12/2025, 11:38:57 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats