Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65669: n/a

0
Unknown
VulnerabilityCVE-2025-65669cvecve-2025-65669
Published: Wed Nov 26 2025 (11/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in classroomio 0.1.13. Student accounts are able to delete courses from the Explore page without any authorization or authentication checks, bypassing the expected admin-only deletion restriction.

AI-Powered Analysis

AILast updated: 11/26/2025, 19:16:02 UTC

Technical Analysis

CVE-2025-65669 is a security vulnerability identified in classroomio version 0.1.13, an educational platform used to manage courses and student interactions. The vulnerability arises from a lack of authorization and authentication checks on the course deletion functionality accessible from the Explore page. Specifically, student accounts, which should have limited privileges, can delete courses without any restrictions, bypassing the intended admin-only deletion policy. This represents a critical access control flaw where the principle of least privilege is violated. The vulnerability compromises the integrity and availability of course data because unauthorized users can remove course content, potentially disrupting the learning environment and causing data loss. The issue does not require elevated privileges beyond a student account, nor does it require additional user interaction, making exploitation straightforward for any authenticated student user. Although no known exploits are currently reported in the wild, the vulnerability's presence in a publicly accessible educational platform poses a significant risk. The absence of a CVSS score necessitates an assessment based on the impact on confidentiality, integrity, availability, ease of exploitation, and scope. Given that the flaw affects data integrity and availability, can be exploited by any authenticated student, and impacts all courses accessible via the Explore page, the severity is high. The vulnerability highlights a critical failure in access control mechanisms and underscores the need for robust role-based access enforcement in educational software.

Potential Impact

For European organizations using classroomio or similar educational platforms, this vulnerability can lead to unauthorized deletion of course content by students, severely impacting the availability and integrity of educational resources. This disruption can affect teaching schedules, student progress tracking, and institutional reputation. The loss or manipulation of course data may require significant recovery efforts and could lead to operational downtime. Additionally, the vulnerability could be exploited to conduct denial-of-service-like attacks on the educational platform by deleting multiple courses, thereby affecting a large number of users. The impact extends beyond technical disruption to potential regulatory and compliance concerns, especially under GDPR, where data integrity and availability are critical. Educational institutions and e-learning service providers across Europe must consider this threat seriously, as it undermines trust in digital learning environments and could affect thousands of students and educators.

Mitigation Recommendations

To mitigate CVE-2025-65669, organizations should immediately review and update the access control mechanisms within classroomio, ensuring that course deletion functionality is strictly limited to authorized administrator roles. Implement role-based access control (RBAC) with explicit permission checks on all sensitive operations, including course deletion. Conduct thorough code audits and penetration testing focused on authorization bypass vulnerabilities. If possible, apply patches or updates from the vendor addressing this issue; if no patch is available, consider disabling the deletion feature temporarily or restricting access to the Explore page to trusted users only. Implement monitoring and alerting for unusual deletion activities to detect potential exploitation attempts early. Educate administrators and users about the vulnerability and encourage reporting of suspicious behavior. Finally, maintain regular backups of course data to enable rapid recovery in case of unauthorized deletions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6927505dbd9e0dd06440c115

Added to database: 11/26/2025, 7:09:17 PM

Last enriched: 11/26/2025, 7:16:02 PM

Last updated: 11/26/2025, 8:19:04 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats