CVE-2025-30973

Codexpert, · Codexpert, Inc. CoSchool LMS

A critical vulnerability has been identified in the Codexpert, Inc.

Executive summary

A critical vulnerability has been identified in the Codexpert, Inc. CoSchool Learning Management System (LMS). This flaw allows a remote, unauthenticated attacker to execute arbitrary code on the server, potentially leading to a complete system compromise. Successful exploitation could result in data theft, service disruption, and unauthorized access to the organization's network.

Vulnerability

The CoSchool LMS application is vulnerable to Deserialization of Untrusted Data. The software fails to properly validate data it receives before deserializing it. An attacker can exploit this by crafting a malicious serialized object and sending it to the application. When the application processes this data, the malicious object is instantiated, allowing the attacker to inject and execute arbitrary code with the privileges of the web server application, a technique known as Object Injection.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high risk to the organization. Successful exploitation could grant an attacker full control over the affected LMS server, leading to severe consequences. These include the theft of sensitive data such as student records, personally identifiable information (PII), and intellectual property; disruption of educational services; and using the compromised server as a pivot point to launch further attacks against the internal network. The potential for reputational damage and regulatory fines is also significant.

Remediation

Immediate Action: Immediately update all instances of CoSchool LMS to a version later than 1.4.3, as recommended by the vendor. Prioritize patching on internet-facing systems. After patching, monitor for any signs of exploitation attempts by reviewing application and system access logs for anomalies that may have occurred before the update was applied.

Proactive Monitoring: Implement enhanced logging and monitoring for the CoSchool LMS application servers. Specifically, look for unusual patterns in inbound network traffic, such as unexpected or malformed serialized data within HTTP POST requests. Monitor for suspicious child processes being spawned by the web server process and any unexpected outbound network connections from the LMS server.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to detect and block Java deserialization attack patterns. Restrict network access to the application server as much as possible, allowing connections only from trusted IP ranges. Ensure Endpoint Detection and Response (EDR) solutions are deployed on the server to detect and block malicious process execution.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.8 and the potential for unauthenticated remote code execution, this vulnerability poses an imminent threat to the organization. We strongly recommend that all affected CoSchool LMS instances be patched immediately. Although this vulnerability is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity makes it a prime candidate for future inclusion. Organizations should treat this with the highest priority and apply the necessary updates without delay.