CVE-2024-25974

The Frentix GmbH OpenOlat LMS is affected by stored a Cross-Site Scripting (XSS) vulnerability. It is possible to upload files within the Media Center of OpenOlat version 18.1.5 (or lower) as an authenticated user without any other rights. Although the filetypes are limited, an SVG image containing an XSS payload can be uploaded. After a successful upload the file can be shared with groups of users (including admins) who can be attacked with the JavaScript payload.
References
Link Resource
http://seclists.org/fulldisclosure/2024/Feb/23 Exploit Mailing List Third Party Advisory
https://r.sec-consult.com/openolat Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2024/Feb/23 Exploit Mailing List Third Party Advisory
https://r.sec-consult.com/openolat Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:*

History

02 Apr 2025, 20:10

Type Values Removed Values Added
First Time Frentix openolat
Frentix
CPE cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:*
References () http://seclists.org/fulldisclosure/2024/Feb/23 - () http://seclists.org/fulldisclosure/2024/Feb/23 - Exploit, Mailing List, Third Party Advisory
References () https://r.sec-consult.com/openolat - () https://r.sec-consult.com/openolat - Exploit, Third Party Advisory
CWE CWE-79

Information

Published : 2024-02-20 08:15

Updated : 2025-04-02 20:10


NVD link : CVE-2024-25974

Mitre link : CVE-2024-25974

CVE.ORG link : CVE-2024-25974


JSON object : View

Products Affected

frentix

  • openolat
CWE
CWE-20

Improper Input Validation

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')