Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64707: CWE-863: Incorrect Authorization in frappe lms

0
Low
VulnerabilityCVE-2025-64707cvecve-2025-64707cwe-863
Published: Wed Nov 12 2025 (11/12/2025, 22:27:54 UTC)
Source: CVE Database V5
Vendor/Project: frappe
Product: lms

Description

Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, when admins revoked a role from the user, the effect was not immediate because of caching. The issue has been fixed in version 2.41.0 by ensuring the cache is cleared after roles are updated.

AI-Powered Analysis

AILast updated: 11/19/2025, 23:17:47 UTC

Technical Analysis

CVE-2025-64707 identifies an incorrect authorization vulnerability (CWE-863) in the Frappe Learning Management System (LMS) affecting versions from 2.0.0 up to 2.41.0. The core issue stems from caching mechanisms that delay the enforcement of role revocation by administrators. When an admin removes a role from a user, the system's cache does not immediately reflect this change, allowing the user to retain the permissions associated with the revoked role temporarily. This can lead to unauthorized access continuation until the cache expires or is manually cleared. The vulnerability does not require user interaction and can only be exploited by users with administrative privileges, limiting its attack surface. The flaw was addressed in version 2.41.0 by implementing cache invalidation immediately after role updates, ensuring that permission changes take effect without delay. The CVSS 4.0 base score is 1.2, reflecting low impact primarily due to the prerequisite of admin privileges and the limited scope of the issue. No known exploits have been reported in the wild, indicating that the vulnerability is not actively targeted. However, organizations relying on Frappe LMS for educational content management should be aware of the risk of delayed permission enforcement, which could be leveraged internally or by malicious insiders. The vulnerability highlights the importance of cache management in authorization systems to prevent stale permissions from persisting.

Potential Impact

For European organizations, the impact of this vulnerability is generally low but context-dependent. In environments where Frappe LMS is used extensively for managing educational content and user roles, delayed revocation of permissions could allow unauthorized users to access sensitive learning materials or administrative functions longer than intended. This could lead to minor confidentiality breaches or unauthorized changes within the LMS. Since exploitation requires administrator-level access, the risk of external attackers leveraging this vulnerability is minimal. However, insider threats or compromised admin accounts could exploit the caching delay to maintain elevated privileges temporarily. In regulated sectors or institutions with strict access control policies, even brief unauthorized access could have compliance implications. The vulnerability does not affect system availability or data integrity directly but undermines the trustworthiness of access control mechanisms. European organizations should consider the potential for privilege persistence in their risk assessments and ensure timely patching to maintain robust authorization enforcement.

Mitigation Recommendations

To mitigate this vulnerability, European organizations using Frappe LMS should upgrade to version 2.41.0 or later, where the cache clearing issue after role updates is resolved. If immediate upgrading is not feasible, administrators should implement manual cache invalidation procedures following any role revocations to ensure permissions are updated promptly. Monitoring and auditing admin activities related to role management can help detect any unusual persistence of permissions. Organizations should also enforce strong authentication and access controls for admin accounts to reduce the risk of insider exploitation. Additionally, reviewing and minimizing the number of users with administrative privileges can limit the attack surface. Implementing real-time monitoring of permission changes and access logs within the LMS can provide early warning of potential misuse. Finally, educating administrators about the caching behavior and the importance of applying patches promptly will enhance overall security posture.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.921Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69150c3912715e9af455a30c

Added to database: 11/12/2025, 10:37:45 PM

Last enriched: 11/19/2025, 11:17:47 PM

Last updated: 12/28/2025, 2:44:42 AM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats