Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65594: n/a

0
High
VulnerabilityCVE-2025-65594cvecve-2025-65594
Published: Tue Dec 09 2025 (12/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OpenSIS 9.2 and below is vulnerable to Incorrect Access Control in Student.php, which allows an authenticated low-privilege user to perform unauthorized database write operations relating to the data of other users.

AI-Powered Analysis

AILast updated: 12/16/2025, 19:53:20 UTC

Technical Analysis

CVE-2025-65594 is an access control vulnerability affecting OpenSIS versions 9.2 and earlier. The issue resides in the Student.php script, where insufficient authorization checks allow authenticated users with low privileges to perform unauthorized database write operations on records belonging to other users. This vulnerability is classified under CWE-284 (Improper Access Control). Exploitation requires authentication but no user interaction, and it can be executed remotely (AV:N). The attack complexity is low (AC:L), meaning an attacker with valid credentials can easily exploit the flaw without additional conditions. The vulnerability impacts confidentiality and integrity severely (C:H/I:H/A:N), as attackers can alter sensitive student data, potentially leading to data corruption, privacy violations, and undermining trust in the system. No patches are currently linked, and no exploits are known in the wild, but the vulnerability is publicly disclosed and rated with a CVSS v3.1 base score of 8.1, indicating high severity. OpenSIS is an open-source Student Information System widely used in educational institutions to manage student records, grades, and other sensitive data, making this vulnerability particularly concerning for organizations relying on this software. The flaw could be leveraged to manipulate academic records, disrupt administrative processes, or facilitate further attacks by corrupting data integrity.

Potential Impact

For European organizations, especially educational institutions using OpenSIS, this vulnerability poses a significant risk to the confidentiality and integrity of student data. Unauthorized database writes could lead to manipulation of grades, personal information, or attendance records, potentially causing reputational damage, legal liabilities under GDPR, and operational disruptions. The integrity compromise could undermine trust in academic records and affect students' academic progress or eligibility. Since the vulnerability requires authentication, insider threats or compromised low-privilege accounts are primary concerns. The lack of user interaction and low attack complexity increase the likelihood of exploitation once credentials are obtained. Additionally, the absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly after disclosure. European institutions must consider the regulatory implications of data breaches involving student information and the potential for cascading effects on related systems.

Mitigation Recommendations

Organizations should immediately audit and restrict user privileges within OpenSIS to ensure that low-privilege users cannot access or modify unauthorized data. Implement strict role-based access controls (RBAC) and verify that access control checks are enforced consistently across all database operations. Monitor database write activities for anomalies indicative of unauthorized modifications. Since no official patch is currently available, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting Student.php endpoints. Educate administrators and users about the risks of credential compromise and enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of account takeover. Regularly back up student data and verify backup integrity to enable recovery in case of data tampering. Stay informed about updates from OpenSIS developers and apply patches promptly once released. Conduct penetration testing and code reviews focused on access control enforcement to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693867e174ebaa3babaf6f2f

Added to database: 12/9/2025, 6:18:09 PM

Last enriched: 12/16/2025, 7:53:20 PM

Last updated: 2/4/2026, 5:24:36 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats