| Type | software | 
| Product Environment | web | 
| Product Name | Frappe LMS | 
| Product Vendor | Frappe | 
| Product Version | 2.35.0 | 
| Product Link | https://github.com/frappe/lms | 
| Vulnerability Name | Cross-Site Scripting | 
| Severity | Medium | 
| CVSS String | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N | 
| CVSS Score | 4.6 | 
| CVE ID | CVE-2025-11283 | 
| Vendor Acknowledgement | Yes | 
| Affected digital Assets | 10 | 
| Affected Users | 50000 | 
| Date of Reporting | Sep 21, 2025 | 
| PoC Exploit | - | 
| Credit | 0xhamy,KhanMarshai | 
Frappe LMS version 2.35.0 contains a cross-site scripting (XSS) vulnerability in the course description field.
When a malicious script is inserted into the course description, it executes in the browser of any instructor or administrator who views the course in edit mode.
The application fails to sanitize user-supplied input in the course description.
An attacker with the ability to create or edit a course can inject arbitrary JavaScript code, which is then executed in the context of other privileged users’ sessions.
We weren't able to steal sensitive data like cookies.
Log in as instructor.
Navigate to:
http://127.0.0.1:8000/app/user?enabled=1
Create two new user accounts.
course_creator_1 and course_creator_2.Course Creator.Create a course.
Log in as course_creator_1.
Inject a malicious payload.
<img src=x onerror=alert(document.cookie)>
Trigger the payload.
course_creator_2 or an administrator opens the course in edit mode, the payload executes.<p>, <b>, <i>).