CVE-2026-25876

9.1 CRITICAL

📋 TL;DR

PlaciPy placement management system version 1.0.0 has a missing object-level authorization vulnerability that allows authenticated users to access assessment results they shouldn't have permission to view. This affects all educational institutions using PlaciPy 1.0.0 for student placement management. The vulnerability enables unauthorized data access through the results API endpoints.

💻 Affected Systems

Products:
  • PlaciPy Placement Management System
Versions: 1.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the backend/src/routes/results.routes.ts component. Requires authentication but lacks proper authorization checks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated user could access all student assessment results across the entire institution, potentially exposing sensitive academic performance data and violating privacy regulations.

🟠

Likely Case

Authenticated users (students, faculty, or staff) could view assessment results for other students or assessments they shouldn't have access to, leading to data privacy violations.

🟢

If Mitigated

With proper authorization checks, users would only see results they're explicitly authorized to access based on their role and permissions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. Attackers can manipulate API requests to access unauthorized data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub advisory for latest patched version

Vendor Advisory: https://github.com/Praskla-Technology/assessment-placipy/security/advisories/GHSA-w238-w4mg-j357

Restart Required: Yes

Instructions:

1. Review the GitHub security advisory
2. Update to the latest patched version of PlaciPy
3. Restart the PlaciPy application
4. Verify authorization checks are properly implemented

🔧 Temporary Workarounds

Implement API Gateway Authorization

all

Add authorization middleware at the API gateway level to validate user permissions before routing to results endpoints

Temporary Access Restriction

all

Restrict access to results API endpoints to only authorized administrative users until patch is applied

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PlaciPy from general user access
  • Deploy a web application firewall (WAF) with custom rules to detect and block unauthorized API requests to results endpoints

🔍 How to Verify

Check if Vulnerable:

Test authenticated API requests to results endpoints with different user accounts to see if authorization checks are properly enforced

Check Version:

Check package.json or application version endpoint for PlaciPy version

Verify Fix Applied:

Verify that authenticated users can only access results they're authorized to view based on their role and permissions

📡 Detection & Monitoring

Log Indicators:

  • Multiple unauthorized access attempts to results API endpoints
  • User accessing results for assessments they shouldn't have permissions for
  • Unusual pattern of results API calls from single user

Network Indicators:

  • High volume of GET/POST requests to /api/results endpoints
  • Requests to results endpoints with different user IDs or assessment IDs

SIEM Query:

source="placipy" AND (uri_path="/api/results" OR uri_path="/api/assessments/*/results") AND user_id!=authorized_user_id

🔗 References

📤 Share & Export