Home

Description

EN DE

A vulnerability was identified in Selleo Mentingo 2025.08.27. This issue affects some unknown processing of the file /api/course/enroll-course of the component Create New Course Basic Settings. Such manipulation of the argument Description leads to cross site scripting. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

In Selleo Mentingo 2025.08.27 ist eine Schwachstelle entdeckt worden. Dabei betrifft es einen unbekannter Codeteil der Datei /api/course/enroll-course der Komponente Create New Course Basic Settings. Durch die Manipulation des Arguments Description mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit ist öffentlich verfügbar und könnte genutzt werden.

PUBLISHED Reserved 2025-09-13 | Published 2025-09-14 | Updated 2025-09-15 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
LOW: 3.5CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
4.0AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR

Problem types

Cross Site Scripting

Code Injection

Product status

2025.08.27
affected

Timeline

2025-09-13:Advisory disclosed
2025-09-13:VulDB entry created
2025-09-13:VulDB entry last update

Credits

KhanMarshal (VulDB User) reporter

References

vuldb.com/?id.323823 (VDB-323823 | Selleo Mentingo Create New Course Basic Settings enroll-course cross site scripting) vdb-entry technical-description

vuldb.com/?ctiid.323823 (VDB-323823 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.643623 (Submit #643623 | Selleo Labs Sp. z o.o. Mentingo learn-v2025.08.27 Cross Site Scripting) third-party-advisory

gist.github.com/KhanMarshaI/584ae9d7ba8578ac040a0f89597fc3c1 exploit

cve.org (CVE-2025-10388)

nvd.nist.gov (CVE-2025-10388)

Download JSON