Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66581: CWE-863: Incorrect Authorization in frappe lms

0
Low
VulnerabilityCVE-2025-66581cvecve-2025-66581cwe-863
Published: Fri Dec 05 2025 (12/05/2025, 18:26:20 UTC)
Source: CVE Database V5
Vendor/Project: frappe
Product: lms

Description

Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.41.0, a flaw in the server-side authorization logic allowed authenticated users to perform actions beyond their assigned roles across multiple features. Because the affected endpoints relied on client-side or UI-level checks instead of enforcing permissions on the server, users with low-privileged roles (such as students) could perform operations intended only for instructors or administrators via directly using the API's. This vulnerability is fixed in 2.41.0.

AI-Powered Analysis

AILast updated: 12/05/2025, 19:00:34 UTC

Technical Analysis

CVE-2025-66581 is an authorization bypass vulnerability classified under CWE-863 affecting the Frappe Learning Management System (LMS) prior to version 2.41.0. The core issue stems from improper server-side authorization logic, where critical permission checks were enforced only on the client side or within the user interface rather than on the server. This design flaw allows authenticated users with low-privileged roles, such as students, to perform unauthorized actions intended for higher-privileged roles like instructors or administrators by directly invoking the LMS's backend APIs. The vulnerability spans multiple features of the LMS, potentially enabling unauthorized data access, modification, or administrative operations. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required beyond authentication (PR:L), no user interaction (UI:N), and limited impact on confidentiality, integrity, and availability (each rated low). The vulnerability was publicly disclosed on December 5, 2025, and is addressed by upgrading to version 2.41.0 or later. There are no known active exploits in the wild, suggesting limited current exploitation but a potential risk if attackers reverse-engineer the flaw. The vulnerability highlights the critical importance of enforcing authorization on the server side rather than relying solely on client-side controls, especially in multi-role systems like LMS platforms.

Potential Impact

For European organizations using Frappe LMS, this vulnerability could allow unauthorized privilege escalation by authenticated users, leading to potential unauthorized access to sensitive educational content, modification of course materials, or disruption of LMS operations. Although the CVSS score is low, the impact on integrity and availability could affect the trustworthiness and reliability of educational services. Confidentiality risks exist if students access restricted data or administrative functions. The risk is heightened in institutions where multiple user roles coexist with varying permissions. Unauthorized actions could undermine academic integrity, data privacy compliance (e.g., GDPR), and operational continuity. However, the requirement for authentication and the absence of known exploits reduce the immediate threat level. Organizations with large deployments of Frappe LMS or those integrating it with other critical systems should consider the potential cascading effects of unauthorized access. The vulnerability may also expose organizations to reputational damage if exploited.

Mitigation Recommendations

European organizations should immediately upgrade all Frappe LMS instances to version 2.41.0 or later, where the authorization flaw is fixed. Until upgrades are completed, implement strict network segmentation and access controls to limit LMS API access to trusted users only. Conduct thorough audits of user roles and permissions to ensure minimal privilege principles are enforced. Monitor LMS logs for unusual API usage patterns indicative of privilege abuse. Disable or restrict API endpoints that allow role-sensitive operations if possible. Educate LMS administrators and users about the risks of direct API access and the importance of using the official UI. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API calls. Regularly review and test authorization controls in the LMS environment to detect similar flaws proactively. Finally, maintain an incident response plan tailored to LMS security incidents to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-04T18:53:42.399Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69332850f88dbe026c046838

Added to database: 12/5/2025, 6:45:36 PM

Last enriched: 12/5/2025, 7:00:34 PM

Last updated: 12/6/2025, 5:05:26 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats