Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65675: n/a

0
Unknown
VulnerabilityCVE-2025-65675cvecve-2025-65675
Published: Wed Nov 26 2025 (11/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG profile pictures.

AI-Powered Analysis

AILast updated: 11/26/2025, 18:58:04 UTC

Technical Analysis

CVE-2025-65675 is a stored cross-site scripting (XSS) vulnerability identified in Classroomio LMS version 0.1.13. The vulnerability arises from insufficient sanitization of SVG profile picture uploads, allowing authenticated users to embed malicious scripts within SVG files. When these crafted SVG images are rendered by other users or administrators, the embedded scripts execute in their browsers, leading to arbitrary code execution within the context of the LMS web application. This persistent XSS can be exploited to hijack user sessions, steal sensitive information, perform actions on behalf of victims, or pivot to further attacks within the LMS environment. The vulnerability requires the attacker to be authenticated, which limits exposure to internal or registered users but does not eliminate risk, especially in environments with many users or weak access controls. No official CVSS score has been assigned yet, but the nature of stored XSS combined with arbitrary code execution potential makes this a significant threat. The lack of available patches or mitigations at the time of disclosure increases the urgency for organizations to implement compensating controls. Classroomio LMS is used in educational settings, where protecting student and faculty data is critical. The vulnerability highlights the risks of allowing SVG uploads without proper sanitization, as SVG files can contain embedded JavaScript. Attackers can exploit this vector to compromise confidentiality, integrity, and availability of the LMS platform.

Potential Impact

For European organizations, particularly educational institutions using Classroomio LMS, this vulnerability could lead to unauthorized access to sensitive student and faculty data, session hijacking, and potential disruption of learning services. The persistent nature of stored XSS means that once exploited, the malicious code can affect multiple users over time, increasing the scope of impact. Confidentiality is at risk due to potential data theft, integrity can be compromised through unauthorized actions performed by attackers, and availability may be affected if the LMS is manipulated or taken offline. Given the increasing reliance on digital learning platforms in Europe, exploitation could undermine trust in these systems and lead to regulatory consequences under GDPR if personal data is exposed. The requirement for authentication reduces the attack surface but does not eliminate risk, especially in large institutions with many users. The absence of known exploits in the wild currently provides a window for proactive defense, but the vulnerability should be treated as high risk due to the ease of exploitation once authenticated and the potential for widespread impact.

Mitigation Recommendations

European organizations should immediately implement strict input validation and sanitization for SVG uploads, ideally disabling SVG uploads entirely if not required. Employ server-side sanitization libraries specifically designed to remove scripts and malicious content from SVG files. Implement Content Security Policy (CSP) headers to restrict script execution and reduce the impact of any injected scripts. Enforce strong authentication and role-based access controls to limit who can upload profile pictures. Monitor LMS logs for unusual upload activity or script execution attempts. Educate users about the risks of uploading untrusted content. If possible, upgrade to a patched version of Classroomio LMS once available. In the interim, consider disabling profile picture uploads or restricting them to non-SVG formats. Conduct regular security assessments and penetration tests focused on input handling and XSS vulnerabilities. Finally, prepare incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69274a408e37a182565a4464

Added to database: 11/26/2025, 6:43:12 PM

Last enriched: 11/26/2025, 6:58:04 PM

Last updated: 11/26/2025, 8:21:06 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats