CVE-2026-25806
Analyzed Analyzed - Analysis Complete
Authorization Bypass in PlaciPy Student API Allows Data Manipulation

Publication date: 2026-02-09

Last updated on: 2026-02-11

Assigner: GitHub, Inc.

Description
PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, the GET /api/students/:email PUT /api/students/:email/status, and DELETE /api/students/:email routes in backend/src/routes/student.routes.ts only enforce authentication using authenticateToken but do not enforce authorization. The application does not verify whether the authenticated user owns the student record being accessed, has an administrative / staff role, or is permitted to modify or delete the target student.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-09
Last Modified
2026-02-11
Generated
2026-05-07
AI Q&A
2026-02-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
prasklatechnology placipy 1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Can you explain this vulnerability to me?

The vulnerability in PlaciPy version 1.0.0 involves insufficient authorization checks in certain API routes related to student records. Specifically, the GET /api/students/:email, PUT /api/students/:email/status, and DELETE /api/students/:email endpoints only require authentication via authenticateToken but do not verify if the authenticated user is authorized to access or modify the student data. This means that any authenticated user could potentially view, update, or delete student records without proper permission checks.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access and modification of student records. An attacker or unauthorized user who is authenticated could view sensitive student information, change student statuses, or delete student records. This could result in data breaches, loss of data integrity, and disruption of the placement management system's operations.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart