CVE-2025-67730: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe lms
Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Versions prior to 2.42.0 allow authenticated users to add malicious HTML and JavaScript through description fields in the Job, Course and Batch forms. This issue is fixed in version 2.42.0.
AI Analysis
Technical Summary
CVE-2025-67730 is an improper input neutralization vulnerability classified under CWE-79 (Cross-site Scripting) affecting the Frappe Learning Management System (LMS) prior to version 2.42.0. The flaw allows authenticated users to inject malicious HTML and JavaScript code into description fields within the Job, Course, and Batch forms. When other users view these fields, the injected scripts can execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability arises due to insufficient sanitization and encoding of user-supplied input before rendering it in web pages. The attack vector is network-based, requiring the attacker to have authenticated access to the LMS and some level of user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates low attack complexity and no privileges required beyond authentication, with partial impacts on confidentiality and integrity but no impact on availability. The issue was publicly disclosed on December 12, 2025, and fixed in version 2.42.0 of Frappe LMS. No known exploits have been reported in the wild, but the vulnerability poses a risk to organizations relying on this LMS for educational content management. The vulnerability underscores the critical need for secure coding practices, especially in web applications handling user-generated content.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive information, such as session tokens or personal data, through malicious script execution. This can compromise user accounts and lead to further attacks within the LMS environment or connected systems. Integrity of data can also be affected if attackers manipulate content or perform unauthorized actions via the victim’s session. Educational institutions and corporate training platforms using Frappe LMS may face reputational damage, regulatory scrutiny under GDPR for data breaches, and operational disruptions if user trust is eroded. Although availability is not directly impacted, the indirect consequences of compromised user accounts and data integrity could lead to service interruptions or increased support costs. The requirement for authentication limits the attack surface but does not eliminate risk, especially in environments with many users or weak access controls. The medium severity rating suggests moderate urgency in patching and mitigation to prevent exploitation.
Mitigation Recommendations
European organizations should immediately upgrade Frappe LMS to version 2.42.0 or later to remediate the vulnerability. Until patching is complete, implement strict input validation and output encoding on all user-supplied content fields, especially the description fields in Job, Course, and Batch forms. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Limit user permissions to reduce the number of users who can input HTML/JavaScript content, and monitor logs for unusual activity related to content submissions. Conduct security awareness training to inform users about the risks of XSS and safe usage practices. Regularly audit LMS configurations and user roles to ensure least privilege principles are enforced. Consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the LMS. Finally, maintain an incident response plan to quickly address any suspected exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-67730: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe lms
Description
Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Versions prior to 2.42.0 allow authenticated users to add malicious HTML and JavaScript through description fields in the Job, Course and Batch forms. This issue is fixed in version 2.42.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-67730 is an improper input neutralization vulnerability classified under CWE-79 (Cross-site Scripting) affecting the Frappe Learning Management System (LMS) prior to version 2.42.0. The flaw allows authenticated users to inject malicious HTML and JavaScript code into description fields within the Job, Course, and Batch forms. When other users view these fields, the injected scripts can execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability arises due to insufficient sanitization and encoding of user-supplied input before rendering it in web pages. The attack vector is network-based, requiring the attacker to have authenticated access to the LMS and some level of user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates low attack complexity and no privileges required beyond authentication, with partial impacts on confidentiality and integrity but no impact on availability. The issue was publicly disclosed on December 12, 2025, and fixed in version 2.42.0 of Frappe LMS. No known exploits have been reported in the wild, but the vulnerability poses a risk to organizations relying on this LMS for educational content management. The vulnerability underscores the critical need for secure coding practices, especially in web applications handling user-generated content.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive information, such as session tokens or personal data, through malicious script execution. This can compromise user accounts and lead to further attacks within the LMS environment or connected systems. Integrity of data can also be affected if attackers manipulate content or perform unauthorized actions via the victim’s session. Educational institutions and corporate training platforms using Frappe LMS may face reputational damage, regulatory scrutiny under GDPR for data breaches, and operational disruptions if user trust is eroded. Although availability is not directly impacted, the indirect consequences of compromised user accounts and data integrity could lead to service interruptions or increased support costs. The requirement for authentication limits the attack surface but does not eliminate risk, especially in environments with many users or weak access controls. The medium severity rating suggests moderate urgency in patching and mitigation to prevent exploitation.
Mitigation Recommendations
European organizations should immediately upgrade Frappe LMS to version 2.42.0 or later to remediate the vulnerability. Until patching is complete, implement strict input validation and output encoding on all user-supplied content fields, especially the description fields in Job, Course, and Batch forms. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Limit user permissions to reduce the number of users who can input HTML/JavaScript content, and monitor logs for unusual activity related to content submissions. Conduct security awareness training to inform users about the risks of XSS and safe usage practices. Regularly audit LMS configurations and user roles to ensure least privilege principles are enforced. Consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the LMS. Finally, maintain an incident response plan to quickly address any suspected exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-10T20:04:28.290Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693bc3e35f3fdafda42e6cf5
Added to database: 12/12/2025, 7:27:31 AM
Last enriched: 12/12/2025, 7:28:26 AM
Last updated: 12/12/2025, 11:22:59 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Notepad++ Patches Updater Flaw After Reports of Traffic Hijacking
MediumSecuring GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work
MediumCVE-2025-12841: CWE-862 Missing Authorization in Bookit
UnknownCVE-2025-12835: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WooMulti
UnknownCVE-2025-40829: CWE-908: Use of Uninitialized Resource in Siemens Simcenter Femap
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.