CVE-2025-65669

9.1 CRITICAL

📋 TL;DR

CVE-2025-65669 is an authorization bypass vulnerability in classroomio 0.1.13 that allows student accounts to delete courses from the Explore page without proper permission checks. This bypasses the intended admin-only restriction, affecting all deployments running the vulnerable version where student accounts exist.

💻 Affected Systems

Products:
  • classroomio
Versions: 0.1.13
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of classroomio 0.1.13 with student accounts are vulnerable. The vulnerability exists in the web interface's authorization logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious or compromised student accounts could delete all courses, causing complete disruption of educational activities and potential data loss.

🟠

Likely Case

Students accidentally or intentionally deleting courses they shouldn't have access to, leading to service disruption and administrative overhead.

🟢

If Mitigated

With proper authorization controls, only administrators can delete courses, maintaining system integrity.

🌐 Internet-Facing: HIGH - The vulnerability affects web applications accessible over the internet, allowing remote exploitation.
🏢 Internal Only: MEDIUM - Even internally, unauthorized course deletion can cause significant disruption.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires student-level credentials but no special tools. The GitHub repository contains proof-of-concept details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: unknown

Vendor Advisory: unknown

Restart Required: No

Instructions:

1. Check the classroomio GitHub repository for security updates. 2. Upgrade to a patched version when available. 3. Review and test authorization controls after patching.

🔧 Temporary Workarounds

Disable course deletion for all users

all

Temporarily remove course deletion functionality until a patch is available

Modify application code to comment out or disable course deletion endpoints

Implement web application firewall rules

all

Block DELETE requests to course endpoints from non-admin accounts

Configure WAF to block DELETE /api/courses/* for user roles != admin

🧯 If You Can't Patch

  • Monitor course deletion logs and set up alerts for any deletions by non-admin accounts
  • Implement manual approval workflow for course deletions or require multi-person authorization

🔍 How to Verify

Check if Vulnerable:

1. Log in as a student account. 2. Navigate to the Explore page. 3. Attempt to delete a course. If deletion succeeds without admin privileges, the system is vulnerable.

Check Version:

Check package.json or application configuration for version number

Verify Fix Applied:

Repeat the vulnerable check steps - student accounts should receive an authorization error when attempting to delete courses.

📡 Detection & Monitoring

Log Indicators:

  • Course deletion events from non-admin user accounts
  • DELETE requests to /api/courses/* from student roles

Network Indicators:

  • HTTP DELETE requests to course endpoints from non-admin IPs

SIEM Query:

source="web_logs" AND (uri_path="/api/courses/*" AND http_method="DELETE" AND user_role!="admin")

🔗 References

📤 Share & Export