Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25809: CWE-285: Improper Authorization in Praskla-Technology assessment-placipy

0
Medium
VulnerabilityCVE-2026-25809cvecve-2026-25809cwe-285
Published: Mon Feb 09 2026 (02/09/2026, 20:58:09 UTC)
Source: CVE Database V5
Vendor/Project: Praskla-Technology
Product: assessment-placipy

Description

PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, the code evaluation endpoint does not validate the assessment lifecycle state before allowing execution. There is no check to ensure that the assessment has started, is not expired, or the submission window is currently open.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:18:51 UTC

Technical Analysis

CVE-2026-25809 is an improper authorization vulnerability (CWE-285) found in version 1.0.0 of Praskla-Technology's assessment-placipy, a placement management system used by educational institutions. The vulnerability resides in the code evaluation endpoint, which does not validate the current lifecycle state of an assessment before permitting code execution. Specifically, the system fails to check whether the assessment has started, whether it is expired, or if the submission window is open. This lack of validation allows users with network access and low privileges to execute code outside the intended assessment timeframe, potentially enabling premature or unauthorized submissions or manipulation of assessment results. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity, with attack vector as network, low attack complexity, no privileges required, no user interaction, and limited impact on integrity. No patches or known exploits are currently available. The flaw undermines the integrity and proper authorization controls of the assessment process, which could lead to academic fraud or disruption of assessment workflows. Given the nature of the product, the impact is primarily on educational institutions relying on this system for secure and fair placement assessments.

Potential Impact

For European organizations, particularly educational institutions using assessment-placipy, this vulnerability poses risks to the integrity and trustworthiness of placement assessments. Unauthorized code execution outside the allowed assessment window could enable students or malicious actors to submit assessments prematurely, alter results, or disrupt the evaluation process. This could lead to unfair academic advantages, reputational damage, and potential legal or regulatory consequences related to educational standards and data integrity. The impact on confidentiality and availability is minimal, but the integrity of assessment data is significantly at risk. Institutions relying on automated or remote assessment systems may face challenges in ensuring compliance with educational regulations and maintaining stakeholder trust. Additionally, if exploited at scale, this vulnerability could undermine broader digital education initiatives across Europe.

Mitigation Recommendations

To mitigate CVE-2026-25809, organizations should implement strict validation of the assessment lifecycle state within the code evaluation endpoint. Specifically, the system must verify that the assessment has officially started, is not expired, and that the submission window is currently open before allowing any code execution. This validation should be enforced server-side to prevent bypass. Additionally, applying role-based access controls to restrict who can invoke code evaluation functions is recommended. Monitoring and logging all code execution requests with timestamps and user identifiers can help detect anomalous or out-of-window activities. Since no official patch is currently available, organizations should consider temporary compensating controls such as disabling remote code execution features until a fix is released. Regularly reviewing and updating the assessment management workflows to incorporate security best practices will also reduce risk. Finally, educating users and administrators about the importance of lifecycle state enforcement can help maintain vigilance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T19:58:01.642Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b05e84b57a58fa1fb453b

Added to database: 2/10/2026, 10:18:16 AM

Last enriched: 2/10/2026, 10:18:51 AM

Last updated: 3/27/2026, 5:09:41 PM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses