Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65672: n/a

0
Unknown
VulnerabilityCVE-2025-65672cvecve-2025-65672
Published: Wed Nov 26 2025 (11/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Insecure Direct Object Reference (IDOR) in classroomio 0.1.13 allows unauthorized share and invite access to course settings.

AI-Powered Analysis

AILast updated: 11/26/2025, 18:58:18 UTC

Technical Analysis

CVE-2025-65672 is an Insecure Direct Object Reference (IDOR) vulnerability identified in classroomio version 0.1.13. IDOR vulnerabilities occur when an application exposes internal object references (such as database keys or file names) without proper authorization checks, allowing attackers to manipulate these references to access unauthorized resources. In this case, the vulnerability allows unauthorized users to gain share and invite access to course settings, which should be restricted to authorized instructors or administrators. This means an attacker can potentially add themselves or others to courses, modify course configurations, or share course access links without permission. The vulnerability arises due to insufficient validation of user permissions when handling requests related to course sharing and invitations. Although no CVSS score has been assigned and no exploits are currently known in the wild, the flaw represents a significant risk because it compromises the integrity and confidentiality of course data. The affected version is 0.1.13, and no patch links are currently provided, indicating that a fix may not yet be available or publicly disclosed. The vulnerability was reserved and published in November 2025, suggesting it is a recent discovery. Since classroomio is an educational platform, unauthorized access could disrupt educational workflows, expose sensitive student or instructor information, and undermine trust in the platform. The lack of authentication requirements or weak access controls makes exploitation relatively straightforward for attackers who can identify valid course identifiers. This vulnerability highlights the critical need for robust access control mechanisms in web applications managing sensitive educational content.

Potential Impact

For European organizations, especially educational institutions, e-learning providers, and corporate training departments using classroomio, this vulnerability could lead to unauthorized access and manipulation of course content and settings. Confidentiality of course materials and participant information could be compromised, potentially exposing personal data protected under GDPR. Integrity of courses could be undermined by unauthorized sharing or invitations, leading to unauthorized participants gaining access or malicious alterations to course configurations. This could disrupt educational activities, damage institutional reputations, and result in regulatory penalties if personal data is exposed. The impact is particularly significant for organizations relying heavily on digital learning platforms for remote or hybrid education. Additionally, unauthorized access could facilitate further attacks such as phishing or social engineering by leveraging trust in course communications. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details become widely known. The lack of a patch increases the urgency for organizations to implement compensating controls. Overall, the vulnerability poses a high risk to confidentiality, integrity, and availability of educational resources within European contexts.

Mitigation Recommendations

Organizations using classroomio should immediately audit access controls related to course sharing and invitation functionalities. Until an official patch is released, implement strict server-side validation to ensure that only authorized users (e.g., course owners or administrators) can perform share or invite actions. Employ role-based access control (RBAC) to restrict permissions and verify user identities before processing requests involving course settings. Monitor logs for unusual access patterns or unauthorized share/invite attempts. Educate instructors and administrators about the risk and encourage them to report suspicious activity. If possible, disable or restrict sharing and invitation features temporarily to reduce exposure. Engage with the classroomio vendor or community to obtain updates or patches addressing the vulnerability. Consider deploying web application firewalls (WAFs) with custom rules to detect and block unauthorized access attempts targeting course identifiers. Conduct penetration testing focused on IDOR vulnerabilities to identify similar weaknesses. Finally, ensure that all sensitive data related to courses and users is encrypted and access is logged for audit purposes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69274a408e37a182565a445f

Added to database: 11/26/2025, 6:43:12 PM

Last enriched: 11/26/2025, 6:58:18 PM

Last updated: 11/26/2025, 7:50:23 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats