CVE-2025-65670

4.3 MEDIUM

📋 TL;DR

This IDOR vulnerability in classroomio 0.1.13 allows students to temporarily access admin/teacher endpoints by manipulating course IDs in URLs, leading to unauthorized disclosure of sensitive course, admin, and student data. All users of classroomio 0.1.13 are affected, particularly educational institutions using this software for course management.

💻 Affected Systems

Products:
  • classroomio
Versions: 0.1.13
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects classroomio version 0.1.13; earlier or later versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all course data including admin credentials, student records, and sensitive educational materials, potentially leading to data breaches and privacy violations.

🟠

Likely Case

Students accessing teacher/admin dashboards to view grades, assignments, and other student data they shouldn't see, with potential for grade manipulation or data theft.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring, where unauthorized access is quickly detected and contained.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires student-level authentication but is trivial once authenticated; public PoC available on GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: unknown

Vendor Advisory: unknown

Restart Required: No

Instructions:

Check GitHub repository for updates; upgrade to patched version when available.

🔧 Temporary Workarounds

Implement Proper Access Controls

all

Add server-side authorization checks for all endpoints to verify user permissions before granting access.

Use Indirect Object References

all

Replace direct object references with indirect references or tokens that cannot be easily manipulated.

🧯 If You Can't Patch

  • Implement network segmentation to isolate classroomio from sensitive systems
  • Enable detailed logging and monitoring for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Test if authenticated student can access admin endpoints by manipulating course ID parameters in URLs.

Check Version:

Check package.json or application version endpoint for classroomio version

Verify Fix Applied:

Verify that server-side authorization checks prevent unauthorized access regardless of URL manipulation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns from student accounts to admin endpoints
  • Multiple failed authorization attempts followed by successful access

Network Indicators:

  • HTTP requests with manipulated course ID parameters to admin endpoints

SIEM Query:

source="classroomio" AND (url="*/admin/*" OR url="*/teacher/*") AND user_role="student"

🔗 References

📤 Share & Export