Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG profile pictures. Discovered by - Rivek Raj Tamang (RivuDon), Sikkim, India.# CVE-2025-65675
Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG profile pictures. Discovered by - Rivek Raj Tamang (RivuDon), Sikkim, India.
**Affected Product: ClassroomIO**
* Affected Version: 0.1.13
* **Discovered by: Rivek Raj Tamang (RivuDon), Sikkim, India**
## Vulnerability Details
Stored Cross Site Scripting
# Summary
A Stored Cross-Site Scripting (XSS) vulnerability exists in Classroomio LMS version 0.1.13, where the application fails to sanitize SVG profile image uploads. An authenticated attacker can upload a malicious SVG file containing embedded JavaScript, which is then stored and executed whenever the profile image is viewed. Because the payload is executed from a trusted domain, this flaw can lead to session hijacking, account takeover, redirection attacks, or further exploitation within the platform.
## Steps to Reproduce
1. Log in and go to profile settings
2. Click on upload image
3. Select the xss svg file and click on upload
4. Wait for it to save
<img width="1564" height="700" alt="image" src="https://github.com/user-attachments/assets/46dffab6-bc8c-45c4-ac4e-945f1aef01c4" />
6. Right click on the profile picture and open on a new tab
7. Note the stored xss being popped.
<img width="576" height="298" alt="image" src="https://github.com/user-attachments/assets/4dbcfecd-a565-4e9b-aba3-304f09246b17" />
# Acknowledgement
This vulnerability was discovered and responsibly reported by:
**Rivek Raj Tamang (RivuDon) from Sikkim, India**
https://www.linkedin.com/in/rivektamang/
https://rivudon.medium.com/
[4.0K] /data/pocs/ae4e755080dacb5f7785c4130794338f565022b6
└── [1.6K] README.md
1 directory, 1 file