Description
An Incorrect Access Control vulnerability exists in INDEX-EDUCATION PRONOTE prior to 2025.2.8. The affected components (index.js and composeUrlImgPhotoIndividu) allow the construction of direct URLs to user profile images based solely on predictable identifiers such as user IDs and names. Due to missing authorization checks and lack of rate-limiting when generating or accessing these URLs, an unauthenticated or unauthorized actor may retrieve profile pictures of users by crafting requests with guessed or known identifiers.
Published: 2026-03-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Disclosure of User Images
Action: Apply Patch
AI Analysis

Impact

An Incorrect Access Control vulnerability exists in INDEX-EDUCATION PRONOTE prior to 2025.2.8. The vulnerability allows attacker-controlled request construction, using predictable identifiers such as user IDs and names, to directly generate URLs that point to user profile images. Because the application omits authorization checks and does not enforce rate‑limiting, an unauthenticated or unauthorized actor can retrieve profile pictures simply by guessing or knowing a user’s identifier. The result is a confidentiality breach where personal images are exposed to unintended individuals. The weakness aligns with CWE‑284 (Improper Authorization) and CWE‑639 (Privilege Dropping).

Affected Systems

Affected systems are installations of INDEX‑EDUCATION PRONOTE running any build before version 2025.2.8. The vulnerable components are index.js and composeUrlImgPhotoIndividu. No additional sub‑feature versions are disclosed, so the entire application is considered affected for pre‑2025.2.8 releases.

Risk and Exploitability

CVSS score of 5.3 indicates a medium severity vulnerability. EPSS data is unavailable, but the lack of rate limiting and direct URL construction means exploitation requires only a simple HTTP client and knowledge of a user identifier; the attack is thus straightforward. The vulnerability is not listed in the CISA KEV catalog, implying no known widespread exploitation yet, but the low barrier to access user images warrants prompt remediation. The likely attack vector is a direct HTTP GET request to a constructed image URL, inferred from the description since explicit attack steps are not provided.

Generated by OpenCVE AI on March 16, 2026 at 23:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade INDEX‑EDUCATION PRONOTE to version 2025.2.8 or later to address the access control issue.
  • If an immediate upgrade is not possible, enforce authentication on image URLs or implement forced access control checks to ensure only authorized users can retrieve profile pictures.
  • Introduce rate limiting on image retrieval endpoints to reduce the risk of automated enumeration.
  • Monitor web server logs for abnormal or excessive access patterns to user profile image URLs.
  • Check the vendor’s website or security advisory feed for any further updates or patches.

Generated by OpenCVE AI on March 16, 2026 at 23:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Title Unauthenticated Retrieval of User Profile Images due to Missing Access Control in Pronté

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Index-education
Index-education pronote
Vendors & Products Index-education
Index-education pronote

Mon, 16 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-639
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description An Incorrect Access Control vulnerability exists in INDEX-EDUCATION PRONOTE prior to 2025.2.8. The affected components (index.js and composeUrlImgPhotoIndividu) allow the construction of direct URLs to user profile images based solely on predictable identifiers such as user IDs and names. Due to missing authorization checks and lack of rate-limiting when generating or accessing these URLs, an unauthenticated or unauthorized actor may retrieve profile pictures of users by crafting requests with guessed or known identifiers.
References

Subscriptions

Index-education Pronote
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-16T19:05:49.605Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69727

cve-icon Vulnrichment

Updated: 2026-03-16T19:04:37.528Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T19:16:14.560

Modified: 2026-03-17T14:20:01.670

Link: CVE-2025-69727

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:01Z

Weaknesses