CVE-2025-64705: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in frappe lms
Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.
AI Analysis
Technical Summary
CVE-2025-64705 identifies a vulnerability in the Frappe Learning Management System (LMS) affecting versions from 2.0.0 up to 2.41.0. The core issue is an exposure of sensitive information (CWE-200) where users could access submissions made by other students without proper authorization. This occurs because the system did not enforce adequate role-based access controls and allowed direct URL access to submission data without redirecting unauthorized users. The vulnerability compromises confidentiality by exposing student submissions to unauthorized actors but does not impact system integrity or availability. The flaw can be exploited remotely over the network without user interaction, requiring only limited privileges, which may be granted to enrolled users or authenticated students. The vulnerability was addressed in version 2.41.0 by implementing stricter role checks and redirecting unauthorized access attempts to prevent direct URL exploitation. No known exploits are currently in the wild, and the CVSS v4.0 base score is 1.3, reflecting low severity due to limited impact and exploitation complexity. The vulnerability highlights the importance of enforcing strict access controls in LMS platforms to protect sensitive educational data from unauthorized disclosure.
Potential Impact
For European organizations, particularly educational institutions using Frappe LMS, this vulnerability poses a risk of unauthorized disclosure of student submissions, potentially violating data protection regulations such as GDPR. Exposure of student work could lead to privacy breaches, reputational damage, and loss of trust. Although the impact is limited to confidentiality and does not affect system availability or integrity, the sensitivity of educational data makes this exposure significant. Institutions that have not updated to version 2.41.0 or later remain vulnerable. The risk is higher in countries with widespread adoption of Frappe LMS or similar open-source LMS platforms. Additionally, educational institutions often handle large volumes of personal data, increasing the potential impact of such leaks. While no active exploitation has been reported, attackers could leverage this vulnerability to gather sensitive academic information or conduct further social engineering attacks.
Mitigation Recommendations
The primary mitigation is to upgrade all affected Frappe LMS instances to version 2.41.0 or later, where the vulnerability is fixed. Organizations should verify that role-based access controls are correctly configured and enforced, ensuring that users can only access their own submissions. Conduct thorough audits of URL access patterns to detect and block unauthorized direct URL access attempts. Implement monitoring and alerting for unusual access to submission data. Educate administrators and users about the importance of access control and the risks of sharing URLs. If immediate upgrade is not possible, consider implementing web application firewalls (WAFs) with rules to restrict access to submission URLs based on user roles. Regularly review and test LMS security configurations to prevent similar issues. Finally, ensure compliance with data protection laws by documenting the vulnerability response and notifying affected individuals if data exposure is confirmed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-64705: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in frappe lms
Description
Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.
AI-Powered Analysis
Technical Analysis
CVE-2025-64705 identifies a vulnerability in the Frappe Learning Management System (LMS) affecting versions from 2.0.0 up to 2.41.0. The core issue is an exposure of sensitive information (CWE-200) where users could access submissions made by other students without proper authorization. This occurs because the system did not enforce adequate role-based access controls and allowed direct URL access to submission data without redirecting unauthorized users. The vulnerability compromises confidentiality by exposing student submissions to unauthorized actors but does not impact system integrity or availability. The flaw can be exploited remotely over the network without user interaction, requiring only limited privileges, which may be granted to enrolled users or authenticated students. The vulnerability was addressed in version 2.41.0 by implementing stricter role checks and redirecting unauthorized access attempts to prevent direct URL exploitation. No known exploits are currently in the wild, and the CVSS v4.0 base score is 1.3, reflecting low severity due to limited impact and exploitation complexity. The vulnerability highlights the importance of enforcing strict access controls in LMS platforms to protect sensitive educational data from unauthorized disclosure.
Potential Impact
For European organizations, particularly educational institutions using Frappe LMS, this vulnerability poses a risk of unauthorized disclosure of student submissions, potentially violating data protection regulations such as GDPR. Exposure of student work could lead to privacy breaches, reputational damage, and loss of trust. Although the impact is limited to confidentiality and does not affect system availability or integrity, the sensitivity of educational data makes this exposure significant. Institutions that have not updated to version 2.41.0 or later remain vulnerable. The risk is higher in countries with widespread adoption of Frappe LMS or similar open-source LMS platforms. Additionally, educational institutions often handle large volumes of personal data, increasing the potential impact of such leaks. While no active exploitation has been reported, attackers could leverage this vulnerability to gather sensitive academic information or conduct further social engineering attacks.
Mitigation Recommendations
The primary mitigation is to upgrade all affected Frappe LMS instances to version 2.41.0 or later, where the vulnerability is fixed. Organizations should verify that role-based access controls are correctly configured and enforced, ensuring that users can only access their own submissions. Conduct thorough audits of URL access patterns to detect and block unauthorized direct URL access attempts. Implement monitoring and alerting for unusual access to submission data. Educate administrators and users about the importance of access control and the risks of sharing URLs. If immediate upgrade is not possible, consider implementing web application firewalls (WAFs) with rules to restrict access to submission URLs based on user roles. Regularly review and test LMS security configurations to prevent similar issues. Finally, ensure compliance with data protection laws by documenting the vulnerability response and notifying affected individuals if data exposure is confirmed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.921Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69150c3912715e9af455a309
Added to database: 11/12/2025, 10:37:45 PM
Last enriched: 11/12/2025, 10:37:59 PM
Last updated: 11/12/2025, 11:38:57 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13076: SQL Injection in code-projects Responsive Hotel Site
MediumCVE-2025-13075: SQL Injection in code-projects Responsive Hotel Site
MediumCVE-2025-64707: CWE-863: Incorrect Authorization in frappe lms
LowCVE-2025-64517: CWE-287: Improper Authentication in trifectatechfoundation sudo-rs
MediumCVE-2025-64503: CWE-787: Out-of-bounds Write in OpenPrinting cups-filters
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.