Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25809: CWE-285: Improper Authorization in Praskla-Technology assessment-placipy

0
Medium
VulnerabilityCVE-2026-25809cvecve-2026-25809cwe-285
Published: Mon Feb 09 2026 (02/09/2026, 20:58:09 UTC)
Source: CVE Database V5
Vendor/Project: Praskla-Technology
Product: assessment-placipy

Description

CVE-2026-25809 is a medium severity improper authorization vulnerability in Praskla-Technology's assessment-placipy version 1. 0. 0. The flaw exists in the code evaluation endpoint, which fails to verify the assessment lifecycle state before allowing code execution. This means that users can execute code even if the assessment has not started, is expired, or the submission window is closed. Exploitation requires network access and low privileges but no user interaction. Although no known exploits are reported in the wild, the vulnerability could allow unauthorized code execution, potentially undermining the integrity of assessment processes. European educational institutions using this system are at risk of manipulation or premature submission of assessments. Mitigation involves implementing strict state validation checks on the assessment lifecycle before code execution is permitted. Countries with significant adoption of this product in education sectors and strong digital education initiatives are most likely affected.

AI-Powered Analysis

AILast updated: 02/10/2026, 10:18:51 UTC

Technical Analysis

CVE-2026-25809 is an improper authorization vulnerability (CWE-285) found in version 1.0.0 of Praskla-Technology's assessment-placipy, a placement management system used by educational institutions. The vulnerability resides in the code evaluation endpoint, which does not validate the current lifecycle state of an assessment before permitting code execution. Specifically, the system fails to check whether the assessment has started, whether it is expired, or if the submission window is open. This lack of validation allows users with network access and low privileges to execute code outside the intended assessment timeframe, potentially enabling premature or unauthorized submissions or manipulation of assessment results. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity, with attack vector as network, low attack complexity, no privileges required, no user interaction, and limited impact on integrity. No patches or known exploits are currently available. The flaw undermines the integrity and proper authorization controls of the assessment process, which could lead to academic fraud or disruption of assessment workflows. Given the nature of the product, the impact is primarily on educational institutions relying on this system for secure and fair placement assessments.

Potential Impact

For European organizations, particularly educational institutions using assessment-placipy, this vulnerability poses risks to the integrity and trustworthiness of placement assessments. Unauthorized code execution outside the allowed assessment window could enable students or malicious actors to submit assessments prematurely, alter results, or disrupt the evaluation process. This could lead to unfair academic advantages, reputational damage, and potential legal or regulatory consequences related to educational standards and data integrity. The impact on confidentiality and availability is minimal, but the integrity of assessment data is significantly at risk. Institutions relying on automated or remote assessment systems may face challenges in ensuring compliance with educational regulations and maintaining stakeholder trust. Additionally, if exploited at scale, this vulnerability could undermine broader digital education initiatives across Europe.

Mitigation Recommendations

To mitigate CVE-2026-25809, organizations should implement strict validation of the assessment lifecycle state within the code evaluation endpoint. Specifically, the system must verify that the assessment has officially started, is not expired, and that the submission window is currently open before allowing any code execution. This validation should be enforced server-side to prevent bypass. Additionally, applying role-based access controls to restrict who can invoke code evaluation functions is recommended. Monitoring and logging all code execution requests with timestamps and user identifiers can help detect anomalous or out-of-window activities. Since no official patch is currently available, organizations should consider temporary compensating controls such as disabling remote code execution features until a fix is released. Regularly reviewing and updating the assessment management workflows to incorporate security best practices will also reduce risk. Finally, educating users and administrators about the importance of lifecycle state enforcement can help maintain vigilance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T19:58:01.642Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b05e84b57a58fa1fb453b

Added to database: 2/10/2026, 10:18:16 AM

Last enriched: 2/10/2026, 10:18:51 AM

Last updated: 2/10/2026, 1:15:35 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats