CVE-2024-25973

The Frentix GmbH OpenOlat LMS is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities. An attacker with rights to create or edit groups can create a course with a name that contains an XSS payload. Furthermore, attackers with the permissions to create or rename a catalog (sub-category) can enter unfiltered input in the name field. In addition, attackers who are allowed to create curriculums can also enter unfiltered input in the name field. This allows an attacker to execute stored JavaScript code with the permissions of the victim in the context of the user's browser.
References
Link Resource
http://seclists.org/fulldisclosure/2024/Feb/23 Exploit Mailing List
https://r.sec-consult.com/openolat Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2024/Feb/23 Exploit Mailing List
https://r.sec-consult.com/openolat Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:*

History

13 Feb 2025, 18:17

Type Values Removed Values Added
Summary (en) The Frentix GmbH OpenOlat LMS is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities. An attacker with rights to create or edit groups can create a course with a name that contains an XSS payload. Furthermore, attackers with the permissions to create or rename a catalog (sub-category) can enter unfiltered input in the name field. In addition, attackers who are allowed to create curriculums can also enter unfiltered input in the name field. This allows an attacker to execute stored JavaScript code with the permissions of the victim in the context of the user's browser. (en) The Frentix GmbH OpenOlat LMS is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities. An attacker with rights to create or edit groups can create a course with a name that contains an XSS payload. Furthermore, attackers with the permissions to create or rename a catalog (sub-category) can enter unfiltered input in the name field. In addition, attackers who are allowed to create curriculums can also enter unfiltered input in the name field. This allows an attacker to execute stored JavaScript code with the permissions of the victim in the context of the user's browser.

12 Feb 2025, 18:51

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2024/Feb/23 - () http://seclists.org/fulldisclosure/2024/Feb/23 - Exploit, Mailing List
References () https://r.sec-consult.com/openolat - () https://r.sec-consult.com/openolat - Exploit, Third Party Advisory
First Time Frentix
Frentix openolat
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:*

Information

Published : 2024-02-20 08:15

Updated : 2025-03-14 02:15


NVD link : CVE-2024-25973

Mitre link : CVE-2024-25973

CVE.ORG link : CVE-2024-25973


JSON object : View

Products Affected

frentix

  • openolat
CWE
CWE-20

Improper Input Validation

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')