CVE-2025-10388: Cross Site Scripting in Selleo Mentingo
A vulnerability was identified in Selleo Mentingo 2025.08.27. This issue affects some unknown processing of the file /api/course/enroll-course of the component Create New Course Basic Settings. Such manipulation of the argument Description leads to cross site scripting. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10388 is a cross-site scripting (XSS) vulnerability identified in Selleo Mentingo version 2025.08.27, specifically affecting the /api/course/enroll-course endpoint within the Create New Course Basic Settings component. The vulnerability arises from improper handling of the 'Description' argument, which allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without requiring authentication, although user interaction is necessary to trigger the malicious payload. The vendor has been notified but has not responded or issued a patch. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity, no privileges required, and user interaction needed. The impact primarily affects confidentiality and integrity at a low level, with no direct impact on availability or system control. Exploitation could lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user within the Mentingo platform. The exploit code is publicly available, increasing the risk of exploitation, although no known active exploitation has been reported yet.
Potential Impact
For European organizations using Selleo Mentingo 2025.08.27, this vulnerability poses a moderate risk. As Mentingo is a platform likely used for course management and enrollment, exploitation could allow attackers to steal session tokens or manipulate user actions, potentially leading to unauthorized access to sensitive educational or organizational data. The impact is heightened in environments where Mentingo integrates with other internal systems or holds personally identifiable information (PII) of students or employees. Given the lack of vendor response and patch availability, organizations face an increased window of exposure. The medium severity suggests that while the vulnerability is not critical, it can still facilitate further attacks or data breaches if combined with other weaknesses. European organizations with high reliance on Mentingo for training or educational services should be particularly vigilant, as exploitation could undermine trust and compliance with data protection regulations such as GDPR.
Mitigation Recommendations
Organizations should implement immediate compensating controls to mitigate the risk. These include input validation and output encoding on the client side to prevent script execution, deploying web application firewalls (WAFs) with rules targeting XSS payloads specific to the vulnerable endpoint, and monitoring logs for suspicious activity related to the /api/course/enroll-course endpoint. User education to recognize phishing attempts leveraging this vulnerability can reduce successful exploitation. Network segmentation to limit access to the Mentingo platform and enforcing strict Content Security Policy (CSP) headers can further reduce the impact of XSS attacks. Until an official patch is released, organizations should consider restricting or closely monitoring access to the vulnerable version of Mentingo, and if feasible, temporarily disabling the affected functionality. Regular vulnerability scanning and penetration testing focused on this vector are recommended to detect exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-10388: Cross Site Scripting in Selleo Mentingo
Description
A vulnerability was identified in Selleo Mentingo 2025.08.27. This issue affects some unknown processing of the file /api/course/enroll-course of the component Create New Course Basic Settings. Such manipulation of the argument Description leads to cross site scripting. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10388 is a cross-site scripting (XSS) vulnerability identified in Selleo Mentingo version 2025.08.27, specifically affecting the /api/course/enroll-course endpoint within the Create New Course Basic Settings component. The vulnerability arises from improper handling of the 'Description' argument, which allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without requiring authentication, although user interaction is necessary to trigger the malicious payload. The vendor has been notified but has not responded or issued a patch. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity, no privileges required, and user interaction needed. The impact primarily affects confidentiality and integrity at a low level, with no direct impact on availability or system control. Exploitation could lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user within the Mentingo platform. The exploit code is publicly available, increasing the risk of exploitation, although no known active exploitation has been reported yet.
Potential Impact
For European organizations using Selleo Mentingo 2025.08.27, this vulnerability poses a moderate risk. As Mentingo is a platform likely used for course management and enrollment, exploitation could allow attackers to steal session tokens or manipulate user actions, potentially leading to unauthorized access to sensitive educational or organizational data. The impact is heightened in environments where Mentingo integrates with other internal systems or holds personally identifiable information (PII) of students or employees. Given the lack of vendor response and patch availability, organizations face an increased window of exposure. The medium severity suggests that while the vulnerability is not critical, it can still facilitate further attacks or data breaches if combined with other weaknesses. European organizations with high reliance on Mentingo for training or educational services should be particularly vigilant, as exploitation could undermine trust and compliance with data protection regulations such as GDPR.
Mitigation Recommendations
Organizations should implement immediate compensating controls to mitigate the risk. These include input validation and output encoding on the client side to prevent script execution, deploying web application firewalls (WAFs) with rules targeting XSS payloads specific to the vulnerable endpoint, and monitoring logs for suspicious activity related to the /api/course/enroll-course endpoint. User education to recognize phishing attempts leveraging this vulnerability can reduce successful exploitation. Network segmentation to limit access to the Mentingo platform and enforcing strict Content Security Policy (CSP) headers can further reduce the impact of XSS attacks. Until an official patch is released, organizations should consider restricting or closely monitoring access to the vulnerable version of Mentingo, and if feasible, temporarily disabling the affected functionality. Regular vulnerability scanning and penetration testing focused on this vector are recommended to detect exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-13T09:40:01.463Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c7591939776bc2a1466a8f
Added to database: 9/15/2025, 12:08:57 AM
Last enriched: 9/22/2025, 12:40:06 AM
Last updated: 10/29/2025, 9:29:03 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownCVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.