Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69581: n/a

0
Medium
VulnerabilityCVE-2025-69581cvecve-2025-69581
Published: Fri Jan 16 2026 (01/16/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Chamillo LMS 1.11.2. The Social Network /personal_data endpoint exposes full sensitive user information even after logout because proper cache-control is missing. Using the browser back button restores all personal data, allowing unauthorized users on the same device to view confidential information. This leads to profiling, impersonation, targeted attacks, and significant privacy risks.

AI-Powered Analysis

AILast updated: 01/23/2026, 19:51:59 UTC

Technical Analysis

The vulnerability identified as CVE-2025-69581 affects Chamillo LMS version 1.11.2, specifically the Social Network /personal_data endpoint. The issue stems from the absence of proper cache-control headers, which causes sensitive user data to be stored in the browser cache even after the user logs out. Consequently, when a user presses the browser's back button, the cached page is restored, revealing full personal information to anyone with access to the device. This flaw violates secure session termination principles and exposes confidential data such as personal identifiers, potentially including names, contact details, or other sensitive profile information. The vulnerability is classified under CWE-524 (Information Exposure Through Cache). Exploitation requires local access to the device and user interaction (pressing the back button), but no authentication or elevated privileges are necessary. The CVSS 3.1 score is 5.5 (medium severity), reflecting the local attack vector, low complexity, no privileges required, but requiring user interaction. The impact is primarily on confidentiality, with no direct effect on integrity or availability. No patches or known exploits are currently available, so mitigation relies on configuration changes and user awareness. This vulnerability can lead to profiling, impersonation, and targeted attacks if an unauthorized person gains access to the device after logout.

Potential Impact

For European organizations using Chamillo LMS, this vulnerability poses a significant privacy risk, especially in environments where devices are shared or not physically secured, such as educational institutions, training centers, or corporate learning environments. Unauthorized access to cached personal data can lead to identity theft, profiling, and social engineering attacks targeting employees or students. The exposure of sensitive information may also violate GDPR requirements regarding data protection and secure session management, potentially resulting in regulatory penalties and reputational damage. While the vulnerability does not allow remote exploitation, the risk is heightened in scenarios where devices are shared or left unattended. The inability to fully clear sensitive data after logout undermines user trust and may impact compliance with European data privacy laws.

Mitigation Recommendations

To mitigate CVE-2025-69581, organizations should implement the following specific actions: 1) Configure Chamillo LMS or the underlying web server to include strict cache-control headers (e.g., 'Cache-Control: no-store, no-cache, must-revalidate') on all sensitive endpoints, especially /personal_data, to prevent caching of personal information. 2) Ensure that logout functionality properly invalidates sessions and triggers cache clearing mechanisms on the client side. 3) Educate users to close browser tabs or clear browsing data after logout, particularly on shared devices. 4) Where possible, enforce device-level security policies such as screen locking and session timeouts to reduce unauthorized local access. 5) Monitor for updates or patches from Chamillo LMS developers and apply them promptly once available. 6) Conduct regular security reviews and penetration tests focusing on session management and cache control. 7) Consider deploying Content Security Policy (CSP) headers to limit exposure of sensitive data in the browser environment. These measures go beyond generic advice by focusing on cache-control header configuration and user behavior in shared device contexts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696a9344b22c7ad868dc834e

Added to database: 1/16/2026, 7:36:36 PM

Last enriched: 1/23/2026, 7:51:59 PM

Last updated: 2/7/2026, 12:01:18 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats