CVE-2026-25811

9.1 CRITICAL

📋 TL;DR

PlaciPy placement management system version 1.0.0 allows cross-tenant data access by deriving tenant identifiers from user-provided email domains without validating domain ownership. This vulnerability enables unauthorized access to data across different educational institution tenants. All users of PlaciPy 1.0.0 are affected.

💻 Affected Systems

Products:
  • PlaciPy
Versions: 1.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of PlaciPy 1.0.0 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all tenant data, allowing attackers to access, modify, or delete sensitive student placement information across all institutions using the system.

🟠

Likely Case

Unauthorized viewing of cross-tenant placement data, potentially exposing student records, institutional arrangements, and confidential educational information.

🟢

If Mitigated

Limited exposure if proper domain validation is implemented, restricting users to their legitimate tenant scope.

🌐 Internet-Facing: HIGH - The vulnerability affects web applications that are typically internet-facing, allowing remote exploitation.
🏢 Internal Only: MEDIUM - Even internally deployed instances remain vulnerable to insider threats or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid user account but is technically simple - attackers can modify email domain to access other tenants.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub advisory for latest patched version

Vendor Advisory: https://github.com/Praskla-Technology/assessment-placipy/security/advisories/GHSA-3gmm-9ww2-87fh

Restart Required: Yes

Instructions:

1. Review GitHub security advisory for patched version. 2. Update PlaciPy to latest patched version. 3. Restart application services. 4. Verify domain validation is properly implemented.

🔧 Temporary Workarounds

Implement domain validation middleware

all

Add server-side validation to verify domain ownership before tenant assignment

# Custom implementation required based on framework

Restrict email domain patterns

all

Implement strict email domain validation and tenant mapping

# Configuration changes in authentication module

🧯 If You Can't Patch

  • Implement network segmentation to isolate PlaciPy instances per tenant
  • Deploy WAF rules to detect and block suspicious cross-tenant access patterns

🔍 How to Verify

Check if Vulnerable:

Test if changing email domain in user registration/login allows access to different tenant data without proper validation.

Check Version:

Check PlaciPy version in application interface or configuration files

Verify Fix Applied:

Verify that domain validation occurs and cross-tenant access is properly restricted after update.

📡 Detection & Monitoring

Log Indicators:

  • Multiple tenant access attempts from single user account
  • Unusual domain patterns in authentication logs
  • Cross-tenant API calls

Network Indicators:

  • Unusual data access patterns across tenant boundaries
  • Authentication requests with mismatched domain-tenant mappings

SIEM Query:

source="placipy" AND (event="tenant_access" OR event="auth") | stats count by user, tenant | where count>1

🔗 References

📤 Share & Export