Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11283: Cross Site Scripting in Frappe LMS

0
Medium
VulnerabilityCVE-2025-11283cvecve-2025-11283
Published: Sun Oct 05 2025 (10/05/2025, 05:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Frappe
Product: LMS

Description

A vulnerability was determined in Frappe LMS 2.35.0. This affects an unknown function of the component Course Handler. Executing manipulation of the argument Description can lead to cross site scripting. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. It is suggested to upgrade the affected component. The vendor was informed early about a total of four security issues and confirmed that those have been fixed. However, the release notes on GitHub do not mention them.

AI-Powered Analysis

AILast updated: 10/05/2025, 05:14:32 UTC

Technical Analysis

CVE-2025-11283 is a cross-site scripting (XSS) vulnerability identified in Frappe LMS version 2.35.0, specifically within the Course Handler component. The vulnerability arises from improper sanitization or validation of the 'Description' argument, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript code in the context of the victim's browser without requiring authentication. The vulnerability is classified as medium severity with a CVSS 4.8 score, reflecting moderate impact and exploitability. The attack vector is network-based (remote), with low attack complexity, no privileges required, but user interaction is necessary for the malicious script to execute (e.g., victim visiting a crafted page). The vulnerability impacts confidentiality minimally, with limited integrity impact and no direct availability impact. The vendor was notified early about this and three other security issues, which have been fixed, but the release notes on GitHub do not explicitly mention these fixes. No public exploits are currently known to be in the wild, but the exploit details have been disclosed publicly, increasing the risk of exploitation. The lack of patch links suggests that users should verify updates directly from the vendor or repository to ensure remediation. XSS vulnerabilities like this can be leveraged to steal session cookies, perform phishing attacks, or execute actions on behalf of authenticated users, potentially leading to account compromise or data leakage within the LMS environment.

Potential Impact

For European organizations using Frappe LMS 2.35.0, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of user data. Educational institutions, corporate training departments, and other entities relying on this LMS could see unauthorized script execution leading to session hijacking, credential theft, or unauthorized actions performed with user privileges. Given the remote exploitability and the public disclosure of the vulnerability, attackers could craft malicious links or content that, when accessed by users, compromise their accounts or data. This could result in unauthorized access to sensitive educational materials, personal information of students and staff, and disruption of learning activities. While the vulnerability does not directly affect system availability, the indirect consequences such as loss of trust, regulatory non-compliance (e.g., GDPR), and potential data breaches could have significant operational and reputational impacts. Organizations with large user bases or those handling sensitive personal data are particularly at risk.

Mitigation Recommendations

1. Immediate upgrade: Organizations should promptly upgrade Frappe LMS to the latest version where this vulnerability and related issues are confirmed fixed. If no official patch is available, consider applying vendor-recommended workarounds or temporary mitigations. 2. Input validation and sanitization: Implement additional server-side input validation and output encoding for the 'Description' field to prevent injection of malicious scripts. 3. Content Security Policy (CSP): Deploy strict CSP headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4. User awareness: Educate users about the risks of clicking on suspicious links or content within the LMS platform. 5. Monitor logs and traffic: Implement monitoring to detect unusual activities or exploitation attempts targeting the LMS. 6. Access controls: Limit privileges of LMS users to the minimum necessary to reduce potential damage from compromised accounts. 7. Review third-party integrations: Ensure that any plugins or extensions interacting with the Course Handler component are secure and up to date.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-04T09:22:39.244Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e1fdcc6e243458d9a4d56e

Added to database: 10/5/2025, 5:10:36 AM

Last enriched: 10/5/2025, 5:14:32 AM

Last updated: 10/7/2025, 9:27:04 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats