Impact
ATutor is vulnerable to a reflected cross-site scripting flaw in its /install/install.php endpoint. A specially crafted URL can cause the victim's browser to execute arbitrary JavaScript on the site. The flaw falls under CWE‑79 and presents an opportunity for attackers to run malicious code in the user's browser.
Affected Systems
The vulnerability was confirmed on ATutor version 2.2.4 and the maintainers have not released a patch or a known safe version. The product is no longer actively supported, so any deployment using ATutor 2.2.4, or potentially other 2.x releases, may be exposed. No explicit version range is documented, but all unreleased or unpatched installations should be treated as potentially vulnerable.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity. The EPSS score of less than 1% suggests a low likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation typically requires a user to visit a crafted URL, which is a client-side vector; no authentication or privileged access is required. Because ATutor is no longer actively supported and no patch is available, systems running the affected version remain exposed until remediated.
OpenCVE Enrichment