{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-25973","assignerOrgId":"551230f0-3615-47bd-b7cc-93e92e730bbf","state":"PUBLISHED","assignerShortName":"SEC-VLab","dateReserved":"2024-02-13T09:28:28.809Z","datePublished":"2024-02-20T08:00:37.226Z","dateUpdated":"2025-03-14T00:50:42.483Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"OpenOlat LMS","vendor":"Frentix GmbH","versions":[{"lessThanOrEqual":"18.1.4","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Mike Klostermaier (SEC Consult Vulnerability Lab)"},{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Johannes Völpel (SEC Consult Vulnerability Lab)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The Frentix GmbH OpenOlat LMS is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities.&nbsp;An attacker with rights to create or edit groups can create a course with a name that contains an XSS payload. Furthermore, attackers with the permissions to create or rename a catalog (sub-category) can enter unfiltered input in the name field. In addition, attackers who are allowed to create curriculums can also enter unfiltered input in the name field. This allows an attacker to execute stored JavaScript code with the permissions of the victim in the context of the user's browser.<br><br>"}],"value":"The Frentix GmbH OpenOlat LMS is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities. An attacker with rights to create or edit groups can create a course with a name that contains an XSS payload. Furthermore, attackers with the permissions to create or rename a catalog (sub-category) can enter unfiltered input in the name field. In addition, attackers who are allowed to create curriculums can also enter unfiltered input in the name field. This allows an attacker to execute stored JavaScript code with the permissions of the victim in the context of the user's browser."}],"impacts":[{"capecId":"CAPEC-63","descriptions":[{"lang":"en","value":"CAPEC-63 Cross-Site Scripting (XSS)"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"551230f0-3615-47bd-b7cc-93e92e730bbf","shortName":"SEC-VLab","dateUpdated":"2024-02-21T07:06:01.787Z"},"references":[{"tags":["third-party-advisory"],"url":"https://r.sec-consult.com/openolat"},{"url":"http://seclists.org/fulldisclosure/2024/Feb/23"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The vendor provides a patched version 18.1.5 or higher for the mentioned vulnerabilities."}],"value":"The vendor provides a patched version 18.1.5 or higher for the mentioned vulnerabilities."}],"source":{"discovery":"EXTERNAL"},"title":"Multiple Stored Cross-Site Scripting Vulnerabilities","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"CHANGED","version":"3.1","baseScore":5.4,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","integrityImpact":"LOW","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-02-20T17:49:52.038657Z","id":"CVE-2024-25973","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-14T00:50:42.483Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T23:52:06.478Z"},"title":"CVE Program Container","references":[{"tags":["third-party-advisory","x_transferred"],"url":"https://r.sec-consult.com/openolat"},{"url":"http://seclists.org/fulldisclosure/2024/Feb/23","tags":["x_transferred"]}]}]}}