CVE-2025-10388: Cross Site Scripting in Selleo Mentingo
A vulnerability was identified in Selleo Mentingo 2025.08.27. This issue affects some unknown processing of the file /api/course/enroll-course of the component Create New Course Basic Settings. Such manipulation of the argument Description leads to cross site scripting. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10388 is a cross-site scripting (XSS) vulnerability identified in Selleo Mentingo version 2025.08.27. The vulnerability exists in the processing of the 'Description' argument within the /api/course/enroll-course endpoint, specifically in the component responsible for creating new course basic settings. An attacker can remotely exploit this flaw by injecting malicious scripts into the Description field, which are then executed in the context of the victim's browser when the vulnerable application processes or displays this input. This type of vulnerability can lead to unauthorized actions such as session hijacking, defacement, or redirection to malicious sites. The vulnerability requires no authentication (AV:N, AT:N) but does require some level of user interaction (UI:P), such as a victim viewing the injected content. The CVSS 4.0 base score is 5.1, indicating a medium severity level, with low impact on confidentiality and availability but some impact on integrity due to script execution. The vendor was notified but did not respond, and no patches are currently available. Although no known exploits are reported in the wild, a public exploit exists, increasing the risk of exploitation.
Potential Impact
For European organizations using Selleo Mentingo 2025.08.27, this vulnerability poses a moderate risk. Exploitation could allow attackers to execute arbitrary scripts in users’ browsers, potentially leading to theft of session tokens, user impersonation, or delivery of further malware. This is particularly concerning for educational institutions or corporate training environments that rely on Mentingo for course enrollment and management, as attackers could manipulate course descriptions to target administrators or students. The impact on confidentiality is limited but non-negligible, as sensitive user data could be exposed through session hijacking. Integrity is moderately affected due to the possibility of script injection altering displayed content or performing unauthorized actions. Availability impact is minimal. Since the vulnerability is remotely exploitable without authentication, attackers can target users broadly, increasing the risk of phishing or social engineering campaigns leveraging the vulnerability. European organizations with significant user bases on this platform may face reputational damage and compliance risks under GDPR if user data is compromised.
Mitigation Recommendations
Given the lack of vendor response and absence of patches, European organizations should implement immediate compensating controls. First, apply strict input validation and output encoding on the Description field at the application or web server level to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Use Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the /api/course/enroll-course endpoint. Educate users about the risks of clicking on suspicious links or interacting with untrusted course descriptions. Monitor logs for unusual activity related to course creation or enrollment APIs. If possible, restrict access to the vulnerable endpoint to trusted IP ranges or authenticated users only, reducing exposure. Finally, maintain regular backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10388: Cross Site Scripting in Selleo Mentingo
Description
A vulnerability was identified in Selleo Mentingo 2025.08.27. This issue affects some unknown processing of the file /api/course/enroll-course of the component Create New Course Basic Settings. Such manipulation of the argument Description leads to cross site scripting. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10388 is a cross-site scripting (XSS) vulnerability identified in Selleo Mentingo version 2025.08.27. The vulnerability exists in the processing of the 'Description' argument within the /api/course/enroll-course endpoint, specifically in the component responsible for creating new course basic settings. An attacker can remotely exploit this flaw by injecting malicious scripts into the Description field, which are then executed in the context of the victim's browser when the vulnerable application processes or displays this input. This type of vulnerability can lead to unauthorized actions such as session hijacking, defacement, or redirection to malicious sites. The vulnerability requires no authentication (AV:N, AT:N) but does require some level of user interaction (UI:P), such as a victim viewing the injected content. The CVSS 4.0 base score is 5.1, indicating a medium severity level, with low impact on confidentiality and availability but some impact on integrity due to script execution. The vendor was notified but did not respond, and no patches are currently available. Although no known exploits are reported in the wild, a public exploit exists, increasing the risk of exploitation.
Potential Impact
For European organizations using Selleo Mentingo 2025.08.27, this vulnerability poses a moderate risk. Exploitation could allow attackers to execute arbitrary scripts in users’ browsers, potentially leading to theft of session tokens, user impersonation, or delivery of further malware. This is particularly concerning for educational institutions or corporate training environments that rely on Mentingo for course enrollment and management, as attackers could manipulate course descriptions to target administrators or students. The impact on confidentiality is limited but non-negligible, as sensitive user data could be exposed through session hijacking. Integrity is moderately affected due to the possibility of script injection altering displayed content or performing unauthorized actions. Availability impact is minimal. Since the vulnerability is remotely exploitable without authentication, attackers can target users broadly, increasing the risk of phishing or social engineering campaigns leveraging the vulnerability. European organizations with significant user bases on this platform may face reputational damage and compliance risks under GDPR if user data is compromised.
Mitigation Recommendations
Given the lack of vendor response and absence of patches, European organizations should implement immediate compensating controls. First, apply strict input validation and output encoding on the Description field at the application or web server level to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Use Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the /api/course/enroll-course endpoint. Educate users about the risks of clicking on suspicious links or interacting with untrusted course descriptions. Monitor logs for unusual activity related to course creation or enrollment APIs. If possible, restrict access to the vulnerable endpoint to trusted IP ranges or authenticated users only, reducing exposure. Finally, maintain regular backups and incident response plans to quickly recover from potential compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-13T09:40:01.463Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c7591939776bc2a1466a8f
Added to database: 9/15/2025, 12:08:57 AM
Last enriched: 9/15/2025, 12:11:30 AM
Last updated: 9/15/2025, 3:23:25 AM
Views: 6
Related Threats
CVE-2025-10425: Unrestricted Upload in 1000projects Online Student Project Report Submission and Evaluation System
MediumCVE-2025-10424: Unrestricted Upload in 1000projects Online Student Project Report Submission and Evaluation System
MediumCVE-2025-10423: Guessable CAPTCHA in newbee-mall
MediumCVE-2025-59375: CWE-770 Allocation of Resources Without Limits or Throttling in libexpat project libexpat
HighCVE-2025-10452: CWE-306 Missing Authentication for Critical Function in Gotac Statistical Database System
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.