Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25875: CWE-863: Incorrect Authorization in Praskla-Technology assessment-placipy

0
Critical
VulnerabilityCVE-2026-25875cvecve-2026-25875cwe-863
Published: Mon Feb 09 2026 (02/09/2026, 21:07:15 UTC)
Source: CVE Database V5
Vendor/Project: Praskla-Technology
Product: assessment-placipy

Description

CVE-2026-25875 is a critical authorization vulnerability in Praskla-Technology's assessment-placipy version 1. 0. 0, a placement management system for educational institutions. The flaw arises because the admin authorization middleware trusts client-controlled JWT claims (role and scope) without enforcing server-side verification. This allows attackers to escalate privileges by manipulating JWT tokens, gaining unauthorized admin access without authentication or user interaction. The vulnerability has a CVSS 4. 0 score of 9. 3, indicating a critical severity with high impact on confidentiality and integrity. No known exploits are currently reported in the wild. European educational institutions using this software are at risk of unauthorized data access and manipulation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/17/2026, 09:49:36 UTC

Technical Analysis

CVE-2026-25875 is an incorrect authorization vulnerability classified under CWE-863 found in Praskla-Technology's assessment-placipy version 1.0.0, a placement management system used by educational institutions. The vulnerability stems from the system's admin authorization middleware trusting client-supplied JWT claims, specifically the 'role' and 'scope' attributes, without enforcing server-side validation of these claims. JWTs (JSON Web Tokens) are commonly used for stateless authentication and authorization, but trusting client-controlled claims without verification allows attackers to craft or modify tokens to escalate privileges arbitrarily. Because the system does not require authentication or user interaction to exploit this flaw, an attacker can gain unauthorized administrative access simply by manipulating the JWT payload. This can lead to full compromise of the placement management system, including unauthorized access to sensitive student and institutional data, modification of placement records, and disruption of educational workflows. The vulnerability has been assigned a CVSS 4.0 base score of 9.3, reflecting its critical nature due to network attack vector, no required privileges or user interaction, and high impact on confidentiality and integrity. Although no known exploits have been reported in the wild, the ease of exploitation and critical impact make this a high-risk vulnerability. The lack of patch links suggests that no official fix has been released yet, emphasizing the need for immediate mitigation measures. The vulnerability highlights a fundamental security design flaw in how JWT claims are validated, underscoring the importance of server-side authorization checks in any system relying on token-based authentication.

Potential Impact

For European organizations, particularly educational institutions using assessment-placipy, this vulnerability poses a severe risk. Unauthorized administrative access can lead to exposure and manipulation of sensitive student data, including personal information and placement results, potentially violating GDPR and other data protection regulations. The integrity of placement processes can be compromised, affecting students' academic and career outcomes. Additionally, attackers could disrupt institutional operations by altering or deleting critical records. The breach of confidentiality and integrity could damage institutional reputation and lead to legal and financial consequences. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely by any attacker with network access to the system, increasing the attack surface. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability is straightforward to exploit once discovered. European organizations must consider this a critical threat to their educational IT infrastructure.

Mitigation Recommendations

Immediate mitigation should focus on implementing strict server-side validation of JWT claims, ensuring that role and scope attributes are verified against a trusted backend source rather than relying on client-supplied data. Organizations should audit their authorization middleware to confirm that no client-controlled tokens are blindly trusted. If a patch from Praskla-Technology becomes available, it should be applied promptly. In the absence of a patch, organizations can deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious JWT manipulations. Network segmentation and access controls should limit exposure of the placement management system to trusted internal networks only. Regular monitoring and logging of administrative access attempts can help detect exploitation attempts early. Educating IT staff about the risks of JWT misuse and enforcing secure coding practices for token validation in future deployments is essential. Finally, organizations should review and update their incident response plans to address potential exploitation scenarios related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-06T21:08:39.128Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a52254b57a58fa172845c

Added to database: 2/9/2026, 9:31:17 PM

Last enriched: 2/17/2026, 9:49:36 AM

Last updated: 3/26/2026, 11:53:40 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses