Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68270: CWE-862: Missing Authorization in openedx edx-platform

0
Critical
VulnerabilityCVE-2025-68270cvecve-2025-68270cwe-862
Published: Tue Dec 16 2025 (12/16/2025, 18:26:31 UTC)
Source: CVE Database V5
Vendor/Project: openedx
Product: edx-platform

Description

CVE-2025-68270 is a critical missing authorization vulnerability in the Open edX edx-platform that allows users with CourseLimitedStaffRole assigned at the organization level to access and edit courses in the studio interface improperly. This flaw permits unauthorized course listing and editing, violating intended access controls. The vulnerability affects versions prior to commit 05d0d0936daf82c476617257aa6c35f0cd4ca060, which contains the fix. Exploitation requires low privileges but no user interaction, and it can lead to full confidentiality and integrity compromise of course content with limited availability impact. No known exploits are reported in the wild yet. European educational institutions and organizations using Open edX are at risk, especially those with broad role assignments at the organizational level. Immediate patching and role assignment audits are recommended to mitigate this threat.

AI-Powered Analysis

AILast updated: 12/23/2025, 19:33:29 UTC

Technical Analysis

CVE-2025-68270 is a critical authorization bypass vulnerability in the Open edX edx-platform, a widely used learning management system. The issue arises because users assigned the CourseLimitedStaffRole at the organization level, rather than on specific courses, can improperly access and edit courses within the studio interface. This occurs due to missing authorization checks that fail to restrict course access based on the scope of the role assignment. Specifically, these users can list courses they should not have visibility into and make unauthorized modifications to course content. The vulnerability is tracked as CWE-862 (Missing Authorization) and was resolved in commit 05d0d0936daf82c476617257aa6c35f0cd4ca060. The CVSS v3.1 score is 9.9 (critical), reflecting the network exploitable nature (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), with a scope change (S:C) and high impact on confidentiality and integrity (C:H/I:H) and low impact on availability (A:L). This vulnerability could allow an attacker with limited privileges to escalate their access and manipulate course data, potentially compromising the integrity of educational content and exposing sensitive information. No public exploits have been reported yet, but the severity and ease of exploitation make it a significant threat to organizations using affected versions of edx-platform.

Potential Impact

For European organizations, particularly educational institutions and e-learning providers using Open edX, this vulnerability poses a severe risk. Unauthorized access and editing of course materials can lead to data breaches involving student information, intellectual property theft, and disruption of educational services. The integrity of course content is critical for maintaining academic standards and trust; unauthorized modifications could undermine this trust and cause reputational damage. Confidentiality breaches may expose sensitive student data or proprietary course content, potentially violating GDPR and other data protection regulations. Although availability impact is low, the broader consequences on data integrity and confidentiality are significant. Organizations with decentralized role management or those assigning CourseLimitedStaffRole at the organizational level are especially vulnerable. This could affect universities, training providers, and corporate learning departments across Europe that rely on Open edX for course delivery and management.

Mitigation Recommendations

Organizations should immediately update their edx-platform installations to include the fix introduced in commit 05d0d0936daf82c476617257aa6c35f0cd4ca060 or later versions. Until patched, administrators must audit role assignments to ensure that CourseLimitedStaffRole is only granted at the course level, not at the organization level, to prevent unauthorized access. Implement strict role-based access controls (RBAC) and regularly review permissions to avoid privilege escalation. Employ monitoring and logging of course access and modifications to detect suspicious activities promptly. Consider deploying web application firewalls (WAFs) with custom rules to detect anomalous API calls related to course editing. Educate staff on the risks of improper role assignments and enforce the principle of least privilege. Finally, maintain an incident response plan tailored to learning management systems to quickly address any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-16T14:05:31.363Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6941ae5b0d5f6f4391b0c398

Added to database: 12/16/2025, 7:09:15 PM

Last enriched: 12/23/2025, 7:33:29 PM

Last updated: 2/5/2026, 6:27:25 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats