The Frentix GmbH OpenOlat LMS is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities. An attacker with rights to create or edit groups can create a course with a name that contains an XSS payload. Furthermore, attackers with the permissions to create or rename a catalog (sub-category) can enter unfiltered input in the name field. In addition, attackers who are allowed to create curriculums can also enter unfiltered input in the name field. This allows an attacker to execute stored JavaScript code with the permissions of the victim in the context of the user's browser.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2024/Feb/23 | Exploit Mailing List |
https://r.sec-consult.com/openolat | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Feb/23 | Exploit Mailing List |
https://r.sec-consult.com/openolat | Exploit Third Party Advisory |
Configurations
History
13 Feb 2025, 18:17
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) The Frentix GmbH OpenOlat LMS is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities. An attacker with rights to create or edit groups can create a course with a name that contains an XSS payload. Furthermore, attackers with the permissions to create or rename a catalog (sub-category) can enter unfiltered input in the name field. In addition, attackers who are allowed to create curriculums can also enter unfiltered input in the name field. This allows an attacker to execute stored JavaScript code with the permissions of the victim in the context of the user's browser. |
12 Feb 2025, 18:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Feb/23 - Exploit, Mailing List | |
References | () https://r.sec-consult.com/openolat - Exploit, Third Party Advisory | |
First Time |
Frentix
Frentix openolat |
|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CPE | cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:* |
Information
Published : 2024-02-20 08:15
Updated : 2025-03-14 02:15
NVD link : CVE-2024-25973
Mitre link : CVE-2024-25973
CVE.ORG link : CVE-2024-25973
JSON object : View
Products Affected
frentix
- openolat