Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-65675 PoC — ClassroomIO.com 安全漏洞

Source
Associated Vulnerability
Title:ClassroomIO.com 安全漏洞 (CVE-2025-65675)
Description:ClassroomIO.com是ClassroomIO开源的一个教育平台。 ClassroomIO.com 0.1.13版本存在安全漏洞,该漏洞源于存储型跨站脚本,可能导致经过身份验证的攻击者通过特制SVG个人资料图片执行任意代码。
Description
Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG profile pictures. Discovered by - Rivek Raj Tamang (RivuDon), Sikkim, India.
Readme
# CVE-2025-65675
Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG profile pictures. Discovered by - Rivek Raj Tamang (RivuDon), Sikkim, India.

**Affected Product: ClassroomIO**
* Affected Version: 0.1.13
* **Discovered by: Rivek Raj Tamang (RivuDon), Sikkim, India**

## Vulnerability Details
Stored Cross Site Scripting

# Summary
A Stored Cross-Site Scripting (XSS) vulnerability exists in Classroomio LMS version 0.1.13, where the application fails to sanitize SVG profile image uploads. An authenticated attacker can upload a malicious SVG file containing embedded JavaScript, which is then stored and executed whenever the profile image is viewed. Because the payload is executed from a trusted domain, this flaw can lead to session hijacking, account takeover, redirection attacks, or further exploitation within the platform.

## Steps to Reproduce

1. Log in and go to profile settings

2. Click on upload image

3. Select the xss svg file and click on upload

4. Wait for it to save

<img width="1564" height="700" alt="image" src="https://github.com/user-attachments/assets/46dffab6-bc8c-45c4-ac4e-945f1aef01c4" />


6. Right click on the profile picture and open on a new tab

7. Note the stored xss being popped.

<img width="576" height="298" alt="image" src="https://github.com/user-attachments/assets/4dbcfecd-a565-4e9b-aba3-304f09246b17" />


# Acknowledgement 

This vulnerability was discovered and responsibly reported by:

**Rivek Raj Tamang (RivuDon) from Sikkim, India** 

https://www.linkedin.com/in/rivektamang/

https://rivudon.medium.com/


File Snapshot

[4.0K] /data/pocs/ae4e755080dacb5f7785c4130794338f565022b6 └── [1.6K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.