Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71179: n/a

0
Medium
VulnerabilityCVE-2025-71179cvecve-2025-71179
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Creativeitem Academy LMS 7.0 contains reflected Cross-Site Scripting (XSS) vulnerabilities via the search parameter to the /academy/blogs endpoint, and the string parameter to the /academy/course_bundles/search/query endpoint. These vulnerabilities are distinct from the patch for CVE-2023-4119, which only fixed XSS in query and sort_by parameters to the /academy/home/courses endpoint.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:16:12 UTC

Technical Analysis

CVE-2025-71179 identifies a reflected Cross-Site Scripting (XSS) vulnerability in Creativeitem Academy LMS version 7.0. The vulnerability arises from insufficient input sanitization of user-supplied data in two specific HTTP GET parameters: the 'search' parameter on the /academy/blogs endpoint and the 'string' parameter on the /academy/course_bundles/search/query endpoint. Reflected XSS occurs when malicious input is immediately echoed back in the HTTP response without proper encoding or validation, enabling attackers to inject client-side scripts that execute in the context of the victim's browser session. This can lead to session hijacking, credential theft, or redirection to malicious sites. This vulnerability is distinct from CVE-2023-4119, which addressed XSS in other parameters of the LMS, indicating incomplete remediation in the application. No CVSS score has been assigned yet, and no public exploits have been reported, but the vulnerability is publicly disclosed and should be treated seriously. The lack of patches or mitigation details suggests that organizations must proactively implement defensive coding practices and monitor for updates from the vendor. The affected LMS is used for managing educational content and user interactions, making the confidentiality and integrity of user data critical. Attackers exploiting this vulnerability could target students, educators, or administrators by crafting malicious URLs or links that trigger the XSS payload when clicked.

Potential Impact

For European organizations, particularly educational institutions and training providers using Creativeitem Academy LMS 7.0, this vulnerability poses significant risks. Exploitation could lead to theft of user credentials, session tokens, or personal data, undermining user privacy and trust. It could also facilitate phishing attacks or malware distribution by injecting malicious scripts. The reflected nature of the XSS means that attackers need to lure victims into clicking crafted links, which is feasible in phishing campaigns. The impact on confidentiality and integrity is high, while availability is less directly affected. Given the widespread adoption of e-learning platforms in Europe, especially in countries with strong digital education initiatives, the threat could disrupt educational services and damage institutional reputations. Additionally, compliance with GDPR requires protection of personal data, and exploitation of this vulnerability could lead to regulatory penalties if data breaches occur.

Mitigation Recommendations

Organizations should immediately audit their Creativeitem Academy LMS deployments for the affected endpoints and parameters. Until official patches are released, implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the 'search' and 'string' parameters. Employ strict input validation and output encoding on all user-supplied data, especially in URL parameters, to neutralize script injection attempts. Educate users and administrators about the risks of clicking untrusted links. Monitor security advisories from the vendor for patches or updates addressing this vulnerability and apply them promptly. Additionally, conduct regular security testing, including automated scanning and manual penetration testing focused on XSS vectors. Consider implementing Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of potential XSS attacks. Finally, review logging and monitoring to detect exploitation attempts and respond quickly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-30T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd6f9fa50a62f766387

Added to database: 2/4/2026, 8:01:26 AM

Last enriched: 2/4/2026, 8:16:12 AM

Last updated: 2/7/2026, 1:53:29 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats