CVE-2025-67298
Published: 11 March 2026
Description
An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privileges via the endpoints /api/verify and /rest/v1/profile
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires identification, reporting, and correction of system flaws like CVE-2025-67298, directly mitigated by patching to ClassroomIO v0.2.6.
AC-3 enforces approved authorizations at the /api/verify and /rest/v1/profile endpoints, preventing authentication bypass and privilege escalation.
AC-6 applies least privilege to limit the scope and impact of any successful privilege escalation from unauthenticated remote attackers.
Security SummaryAI
CVE-2025-67298 is a privilege escalation vulnerability in ClassroomIO versions before 0.2.6. The flaw resides in the /api/verify and /rest/v1/profile endpoints, enabling a remote attacker to escalate privileges. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWEs 290 (Authentication Bypass), 345 (Insufficient Verification of Data Authenticity), and 639 (Authorization Bypass Through User-Controlled Key).
A remote attacker requires no privileges (PR:N) and can exploit this over the network (AV:N) without user interaction (UI:N), though high attack complexity (AC:H) is needed. Successful exploitation allows privilege escalation with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) in an unchanged scope (S:U).
Mitigation is addressed in ClassroomIO release v0.2.6, available at https://github.com/classroomio/classroomio/releases/tag/v0.2.6. Further technical details, including a proof-of-concept, are provided in the advisory gist at https://gist.github.com/prashunbaral/70c4f6f9d9ff8b82295623073eb41f3a. Security practitioners should prioritize updating affected instances.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote exploitation of public-facing web API endpoints (T1190) with no privileges required, directly facilitating privilege escalation (T1068) via authentication/authorization bypass.