Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64707: CWE-863: Incorrect Authorization in frappe lms

0
Low
VulnerabilityCVE-2025-64707cvecve-2025-64707cwe-863
Published: Wed Nov 12 2025 (11/12/2025, 22:27:54 UTC)
Source: CVE Database V5
Vendor/Project: frappe
Product: lms

Description

Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, when admins revoked a role from the user, the effect was not immediate because of caching. The issue has been fixed in version 2.41.0 by ensuring the cache is cleared after roles are updated.

AI-Powered Analysis

AILast updated: 11/12/2025, 22:38:14 UTC

Technical Analysis

CVE-2025-64707 identifies an incorrect authorization vulnerability (CWE-863) in the Frappe LMS platform, specifically affecting versions from 2.0.0 up to 2.41.0. The core of the issue lies in the caching mechanism used by the system to manage user roles and permissions. When an administrator revokes a role from a user, the system does not immediately clear the cached permissions, causing a delay before the revocation takes effect. This delay means that users may retain access rights that should have been removed, potentially allowing unauthorized access to restricted content or functionalities within the LMS. The vulnerability does not require user interaction and can be triggered remotely without authentication escalation beyond administrator privileges, as only admins can revoke roles. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges required beyond admin, no user interaction, and limited impact on integrity (low) with no impact on confidentiality or availability. The issue was resolved in version 2.41.0 by implementing cache invalidation immediately after role updates, ensuring that permission changes take effect without delay. No public exploits have been reported, and the vulnerability is considered low severity due to the limited window of exposure and requirement for admin privileges to trigger the condition.

Potential Impact

For European organizations using Frappe LMS, this vulnerability could lead to a temporary window where revoked users retain access to sensitive learning content or administrative functions, potentially violating data protection policies and internal access controls. Although the impact is limited and the vulnerability requires admin privileges to exploit, the delayed revocation could undermine trust in access management and compliance with regulations such as GDPR, which mandates strict control over user access to personal data. In environments with frequent role changes or where rapid deprovisioning is critical (e.g., academic institutions, corporate training platforms), this flaw could cause operational risks or data exposure. However, the overall risk is low given the short-lived nature of the caching delay and absence of known active exploitation. Organizations relying on Frappe LMS should consider the potential for privilege retention as a minor but non-negligible risk, especially in high-security or compliance-sensitive contexts.

Mitigation Recommendations

The primary mitigation is to upgrade all Frappe LMS instances to version 2.41.0 or later, where the cache invalidation issue has been fixed. Organizations should implement strict patch management policies to ensure timely updates. Additionally, administrators should audit role revocation processes and monitor user access logs to detect any anomalies or delayed permission changes. Implementing supplementary access controls, such as session timeouts or manual session invalidation upon role changes, can reduce the risk of stale permissions being exploited. Where possible, limit the number of administrators who can revoke roles to reduce the attack surface. Finally, organizations should educate administrators about the caching behavior and encourage verification of role changes taking effect promptly until the patch is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.921Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69150c3912715e9af455a30c

Added to database: 11/12/2025, 10:37:45 PM

Last enriched: 11/12/2025, 10:38:14 PM

Last updated: 11/12/2025, 11:43:19 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats