Description
In Mahara before 24.04.10 and 25 before 25.04.1, an institution administrator or institution support administrator on a multi-tenanted site can masquerade as an institution member in an institution for which they are not an administrator, if they also have the 'Site staff' role.
Published: 2026-04-24
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized impersonation of institution members
Action: Apply patch
AI Analysis

Impact

The vulnerability allows institution administrators or support administrators who also have the Site staff role on a multi‑tenant Mahara site to impersonate users in institutions for which they are not administrators. This enables a privileged user to masquerade as an ordinary member, bypassing ownership boundaries and potentially accessing personal data or executing actions as that member, leading to data leakage or tampering. The flaw is an access‑control oversight (CWE‑284) that permits a user with overlapping roles to exercise permissions beyond their intended scope. While the CVSS score of 4.7 indicates a medium severity, the exploitation requires prior possession of Site staff privileges, limiting the attack surface.

Affected Systems

The flaw exists in Mahara releases before 24.04.10 and before 25.04.1. Any deployment using those releases on a multi‑tenant configuration with Site staff responsibilities is vulnerable. The affected vendors/products list is not available, but the issue targets the Mahara open‑source e‑learning platform.

Risk and Exploitability

The EPSS score is below 1 %, suggesting a low likelihood of exploitation in the near term, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation necessitates that the attacker already possess Site staff privileges, which could be obtained through social engineering or compromised accounts. Once in place, the attacker can locally impersonate a member of another institution by accessing the institution member interface. Given the moderate CVSS score and limited scope, the risk is moderate but warrants remediation.

Generated by OpenCVE AI on April 28, 2026 at 07:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mahara to at least 24.04.10 or 25.04.1 to eliminate the role‑mixing issue.
  • Restrict the Site staff role, removing the ability to alter organisation‑level permissions and apply least‑privilege principles.
  • Audit current user roles and re‑assign any users with both administrator and Site staff privileges who do not need such overlap.
  • Enable detailed logging for role changes and inter‑institution access, and review logs regularly for anomalous activity.

Generated by OpenCVE AI on April 28, 2026 at 07:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 07:30:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Masquerading in Multi‑Tenant Mahara

Mon, 27 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Mahara
Mahara mahara
Vendors & Products Mahara
Mahara mahara

Fri, 24 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description In Mahara before 24.04.10 and 25 before 25.04.1, an institution administrator or institution support administrator on a multi-tenanted site can masquerade as an institution member in an institution for which they are not an administrator, if they also have the 'Site staff' role.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-24T16:12:42.266Z

Reserved: 2025-09-12T00:00:00.000Z

Link: CVE-2025-59308

cve-icon Vulnrichment

Updated: 2026-04-24T16:11:16.604Z

cve-icon NVD

Status : Deferred

Published: 2026-04-24T16:16:23.610

Modified: 2026-04-24T17:54:36.243

Link: CVE-2025-59308

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T07:15:19Z

Weaknesses