Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66581: CWE-863: Incorrect Authorization in frappe lms

0
Low
VulnerabilityCVE-2025-66581cvecve-2025-66581cwe-863
Published: Fri Dec 05 2025 (12/05/2025, 18:26:20 UTC)
Source: CVE Database V5
Vendor/Project: frappe
Product: lms

Description

Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.41.0, a flaw in the server-side authorization logic allowed authenticated users to perform actions beyond their assigned roles across multiple features. Because the affected endpoints relied on client-side or UI-level checks instead of enforcing permissions on the server, users with low-privileged roles (such as students) could perform operations intended only for instructors or administrators via directly using the API's. This vulnerability is fixed in 2.41.0.

AI-Powered Analysis

AILast updated: 12/12/2025, 19:13:45 UTC

Technical Analysis

CVE-2025-66581 is an authorization bypass vulnerability classified under CWE-863 affecting Frappe Learning Management System (LMS) versions before 2.41.0. The root cause is improper enforcement of server-side authorization controls, where the system relied heavily on client-side or UI-level permission checks. This design flaw allowed authenticated users with minimal privileges, such as students, to bypass role restrictions by directly invoking API endpoints intended for instructors or administrators. As a result, these users could perform unauthorized actions across multiple LMS features, potentially modifying content, accessing restricted data, or altering administrative settings. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. Despite the potential for privilege escalation within the LMS, the CVSS 4.0 base score is low (1.3) due to limited impact on confidentiality and availability, and the requirement for authenticated access. No known public exploits or active exploitation have been reported. The issue was addressed in Frappe LMS version 2.41.0 by implementing proper server-side authorization checks to enforce role-based access controls consistently across all endpoints.

Potential Impact

For European organizations, particularly educational institutions, universities, and corporate training providers using Frappe LMS, this vulnerability could allow unauthorized privilege escalation within their learning platforms. Attackers with low-level user accounts could manipulate course content, access sensitive instructional materials, or interfere with administrative functions, potentially undermining the integrity and trustworthiness of the LMS environment. While the vulnerability does not directly expose sensitive personal data or cause system-wide outages, unauthorized modifications could disrupt learning activities and damage institutional reputation. The impact is more significant in environments where LMS content controls certification, compliance training, or critical operational knowledge. Given the low CVSS score and lack of known exploits, the immediate risk is limited but should not be ignored, especially in regulated sectors requiring strict access controls.

Mitigation Recommendations

European organizations should promptly upgrade all Frappe LMS instances to version 2.41.0 or later to remediate this vulnerability. Until patched, administrators should restrict LMS access to trusted users and monitor for unusual API activity indicative of privilege abuse. Implement network-level access controls to limit exposure of LMS APIs to internal or VPN-only access. Conduct regular audits of user roles and permissions to ensure no unauthorized privilege escalation has occurred. Additionally, review and harden server-side authorization logic in custom LMS extensions or integrations to prevent similar flaws. Employ logging and alerting on sensitive LMS operations to detect potential misuse early. Finally, educate users about the importance of using only official LMS interfaces and discourage direct API manipulation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-04T18:53:42.399Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69332850f88dbe026c046838

Added to database: 12/5/2025, 6:45:36 PM

Last enriched: 12/12/2025, 7:13:45 PM

Last updated: 1/20/2026, 6:24:34 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats