CVE-2026-23497: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe lms
CVE-2026-23497 is a stored cross-site scripting (XSS) vulnerability in Frappe Learning Management System (LMS) versions 2. 44. 0 and earlier. The flaw arises from improper neutralization of input, specifically in image filenames, which can lead to execution of malicious JavaScript when these filenames are rendered on course or jobs pages. Although the CVSS 4. 0 score is low (1. 3), the vulnerability does not require privileges or authentication but does require user interaction. No known exploits are currently reported in the wild. European organizations using Frappe LMS should be aware of this issue and apply mitigations to prevent potential exploitation, especially in environments where user-generated content is displayed. The impact is limited by the low severity and the need for user interaction, but stored XSS can still lead to session hijacking or defacement if exploited.
AI Analysis
Technical Summary
CVE-2026-23497 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Frappe LMS versions 2.44.0 and earlier. The vulnerability stems from improper neutralization of input during web page generation, specifically in the handling of image filenames uploaded or referenced within the LMS. When a specially crafted image filename containing malicious JavaScript is rendered on course or jobs pages, the script executes in the context of the victim's browser. This stored XSS can lead to various attacks such as session hijacking, defacement, or redirection to malicious sites. The vulnerability does not require any privileges or authentication to exploit but does require user interaction, such as viewing the affected page. The CVSS 4.0 base score is 1.3, reflecting low severity primarily due to the requirement for user interaction and limited impact on confidentiality, integrity, and availability. No patches or exploits are currently publicly available, but the risk remains for organizations using vulnerable versions of Frappe LMS, especially those with public-facing or multi-user environments. The flaw highlights the importance of proper input validation and output encoding in web applications, particularly for user-supplied content like filenames.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but should not be dismissed. Stored XSS can allow attackers to execute arbitrary JavaScript in the context of users' browsers, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of users. In educational institutions or companies using Frappe LMS to manage courses and job postings, exploitation could undermine user trust, lead to data leakage, or facilitate further attacks within the network. Since the vulnerability requires user interaction, the risk is mitigated somewhat by user awareness and security controls. However, in environments with high user traffic or where users have elevated privileges, the consequences could be more severe. The lack of known exploits in the wild reduces immediate threat, but the presence of the vulnerability in widely used LMS software means European organizations should proactively address it to avoid future incidents.
Mitigation Recommendations
1. Upgrade Frappe LMS to a version later than 2.44.0 once a patch is released to fully remediate the vulnerability. 2. Until an official patch is available, implement strict input validation and sanitization on filenames and other user-supplied inputs, ensuring that special characters and script tags are properly encoded or rejected. 3. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS attacks. 4. Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the LMS. 5. Monitor LMS logs and user reports for unusual activity or signs of attempted exploitation. 6. Consider isolating the LMS environment or restricting access to trusted users only, minimizing exposure. 7. Conduct regular security assessments and code reviews focusing on input handling and output encoding to prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2026-23497: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe lms
Description
CVE-2026-23497 is a stored cross-site scripting (XSS) vulnerability in Frappe Learning Management System (LMS) versions 2. 44. 0 and earlier. The flaw arises from improper neutralization of input, specifically in image filenames, which can lead to execution of malicious JavaScript when these filenames are rendered on course or jobs pages. Although the CVSS 4. 0 score is low (1. 3), the vulnerability does not require privileges or authentication but does require user interaction. No known exploits are currently reported in the wild. European organizations using Frappe LMS should be aware of this issue and apply mitigations to prevent potential exploitation, especially in environments where user-generated content is displayed. The impact is limited by the low severity and the need for user interaction, but stored XSS can still lead to session hijacking or defacement if exploited.
AI-Powered Analysis
Technical Analysis
CVE-2026-23497 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Frappe LMS versions 2.44.0 and earlier. The vulnerability stems from improper neutralization of input during web page generation, specifically in the handling of image filenames uploaded or referenced within the LMS. When a specially crafted image filename containing malicious JavaScript is rendered on course or jobs pages, the script executes in the context of the victim's browser. This stored XSS can lead to various attacks such as session hijacking, defacement, or redirection to malicious sites. The vulnerability does not require any privileges or authentication to exploit but does require user interaction, such as viewing the affected page. The CVSS 4.0 base score is 1.3, reflecting low severity primarily due to the requirement for user interaction and limited impact on confidentiality, integrity, and availability. No patches or exploits are currently publicly available, but the risk remains for organizations using vulnerable versions of Frappe LMS, especially those with public-facing or multi-user environments. The flaw highlights the importance of proper input validation and output encoding in web applications, particularly for user-supplied content like filenames.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but should not be dismissed. Stored XSS can allow attackers to execute arbitrary JavaScript in the context of users' browsers, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of users. In educational institutions or companies using Frappe LMS to manage courses and job postings, exploitation could undermine user trust, lead to data leakage, or facilitate further attacks within the network. Since the vulnerability requires user interaction, the risk is mitigated somewhat by user awareness and security controls. However, in environments with high user traffic or where users have elevated privileges, the consequences could be more severe. The lack of known exploits in the wild reduces immediate threat, but the presence of the vulnerability in widely used LMS software means European organizations should proactively address it to avoid future incidents.
Mitigation Recommendations
1. Upgrade Frappe LMS to a version later than 2.44.0 once a patch is released to fully remediate the vulnerability. 2. Until an official patch is available, implement strict input validation and sanitization on filenames and other user-supplied inputs, ensuring that special characters and script tags are properly encoded or rejected. 3. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS attacks. 4. Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the LMS. 5. Monitor LMS logs and user reports for unusual activity or signs of attempted exploitation. 6. Consider isolating the LMS environment or restricting access to trusted users only, minimizing exposure. 7. Conduct regular security assessments and code reviews focusing on input handling and output encoding to prevent similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-13T15:47:41.629Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6967e189d0ff220b953a1236
Added to database: 1/14/2026, 6:33:45 PM
Last enriched: 1/21/2026, 8:38:51 PM
Last updated: 2/6/2026, 1:52:06 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.