Description
Rocket LMS 1.1 contains a persistent cross-site scripting vulnerability in the support ticket module that allows authenticated users to inject malicious script code through the title parameter. Attackers can submit support tickets with embedded HTML/JavaScript payloads that execute in the browsers of other users viewing the message history, enabling session hijacking and phishing attacks.
Published: 2026-05-10
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a persistent XSS flaw in the support ticket module of Rocket LMS 1.1. An authenticated user can craft a malicious script and submit it via the ticket title field. When other users view the ticket history, the script executes in their browsers, which may lead to session hijacking or phishing attempts. The weakness corresponds to input handling failures identified as CWE‑79.

Affected Systems

Rocketsoft’s Rocket LMS version 1.1 is affected. The flaw resides in the support ticket subsystem used by authenticated users to create and read tickets. No other versions or product variants are listed as impacted.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate risk. No EPSS data is available, and the vulnerability is not listed in CISA KEV, suggesting no widespread exploitation is documented. The likely attack vector involves an authenticated attacker creating a ticket; the exploitation requires no special conditions beyond using the standard support ticket interface. Because the payload is stored and executed on other users’ browsers, the impact is mainly confusion, possible loss of session cookies, and phishing opportunities.

Generated by OpenCVE AI on May 10, 2026 at 14:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Rocket LMS to the latest patched release that fixes the stored XSS flaw
  • If an immediate upgrade is not possible, sanitize and encode the ticket title field to escape HTML and JavaScript before storage or rendering, following input validation best practices
  • As a temporary measure, restrict the support ticket module to a limited, trusted set of users and disable historical ticket viewing until the patch or sanitization is in place

Generated by OpenCVE AI on May 10, 2026 at 14:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 13:00:00 +0000

Type Values Removed Values Added
Description Rocket LMS 1.1 contains a persistent cross-site scripting vulnerability in the support ticket module that allows authenticated users to inject malicious script code through the title parameter. Attackers can submit support tickets with embedded HTML/JavaScript payloads that execute in the browsers of other users viewing the message history, enabling session hijacking and phishing attacks.
Title Rocket LMS 1.1 Persistent Cross-Site Scripting via Support Tickets
First Time appeared Rocketsoft
Rocketsoft rocket Lms
Weaknesses CWE-79
CPEs cpe:2.3:a:rocketsoft:rocket_lms:1.1:*:*:*:*:*:*:*
Vendors & Products Rocketsoft
Rocketsoft rocket Lms
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Rocketsoft Rocket Lms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-10T12:43:43.695Z

Reserved: 2026-01-18T12:35:05.177Z

Link: CVE-2021-47907

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-10T13:16:27.247

Modified: 2026-05-10T13:16:27.247

Link: CVE-2021-47907

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T14:45:14Z

Weaknesses