2025-12-28 11:32CVE-2025-15134VulDB
PUBLISHED5.2CWE-79CWE-94

yourmaileyes MOOC Submission MainController.java subreview cross site scripting

A security flaw has been discovered in yourmaileyes MOOC up to 1.17. This affects the function subreview of the file mooc/controller/MainController.java of the component Submission Handler. Performing manipulation of the argument review results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. The project was informed of the problem early through an issue report but has not responded yet.

Problem type

Affected products

yourmaileyes

MOOC

1.0 - AFFECTED

1.1 - AFFECTED

1.2 - AFFECTED

1.3 - AFFECTED

1.4 - AFFECTED

1.5 - AFFECTED

1.6 - AFFECTED

1.7 - AFFECTED

1.8 - AFFECTED

1.9 - AFFECTED

1.10 - AFFECTED

1.11 - AFFECTED

1.12 - AFFECTED

1.13 - AFFECTED

1.14 - AFFECTED

1.15 - AFFECTED

1.16 - AFFECTED

1.17 - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2025-15134
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2025-15134",
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "dateUpdated": "2025-12-28T11:32:05.791Z",
    "dateReserved": "2025-12-27T09:43:07.140Z",
    "datePublished": "2025-12-28T11:32:05.791Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB",
        "dateUpdated": "2025-12-28T11:32:05.791Z"
      },
      "title": "yourmaileyes MOOC Submission MainController.java subreview cross site scripting",
      "descriptions": [
        {
          "lang": "en",
          "value": "A security flaw has been discovered in yourmaileyes MOOC up to 1.17. This affects the function subreview of the file mooc/controller/MainController.java of the component Submission Handler. Performing manipulation of the argument review results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. The project was informed of the problem early through an issue report but has not responded yet."
        }
      ],
      "affected": [
        {
          "vendor": "yourmaileyes",
          "product": "MOOC",
          "modules": [
            "Submission Handler"
          ],
          "versions": [
            {
              "version": "1.0",
              "status": "affected"
            },
            {
              "version": "1.1",
              "status": "affected"
            },
            {
              "version": "1.2",
              "status": "affected"
            },
            {
              "version": "1.3",
              "status": "affected"
            },
            {
              "version": "1.4",
              "status": "affected"
            },
            {
              "version": "1.5",
              "status": "affected"
            },
            {
              "version": "1.6",
              "status": "affected"
            },
            {
              "version": "1.7",
              "status": "affected"
            },
            {
              "version": "1.8",
              "status": "affected"
            },
            {
              "version": "1.9",
              "status": "affected"
            },
            {
              "version": "1.10",
              "status": "affected"
            },
            {
              "version": "1.11",
              "status": "affected"
            },
            {
              "version": "1.12",
              "status": "affected"
            },
            {
              "version": "1.13",
              "status": "affected"
            },
            {
              "version": "1.14",
              "status": "affected"
            },
            {
              "version": "1.15",
              "status": "affected"
            },
            {
              "version": "1.16",
              "status": "affected"
            },
            {
              "version": "1.17",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Cross Site Scripting",
              "cweId": "CWE-79",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Code Injection",
              "cweId": "CWE-94",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://vuldb.com/?id.338512",
          "name": "VDB-338512 | yourmaileyes MOOC Submission MainController.java subreview cross site scripting",
          "tags": [
            "vdb-entry",
            "technical-description"
          ]
        },
        {
          "url": "https://vuldb.com/?ctiid.338512",
          "name": "VDB-338512 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ]
        },
        {
          "url": "https://vuldb.com/?submit.713955",
          "name": "Submit #713955 | yourmaileyes MOOC V1.17 Improper Neutralization of Alternate XSS Syntax",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://github.com/yourmaileyes/MOOC/issues/12",
          "tags": [
            "issue-tracking"
          ]
        },
        {
          "url": "https://github.com/yourmaileyes/MOOC/issues/12#issue-3722197285",
          "tags": [
            "exploit",
            "issue-tracking"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R",
            "baseScore": 3.5,
            "baseSeverity": "LOW"
          }
        },
        {
          "cvssV3_0": {
            "version": "3.0",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R",
            "baseScore": 3.5,
            "baseSeverity": "LOW"
          }
        },
        {
          "cvssV2_0": {
            "version": "2.0",
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR",
            "baseScore": 4
          }
        }
      ],
      "timeline": [
        {
          "time": "2025-12-27T00:00:00.000Z",
          "lang": "en",
          "value": "Advisory disclosed"
        },
        {
          "time": "2025-12-27T01:00:00.000Z",
          "lang": "en",
          "value": "VulDB entry created"
        },
        {
          "time": "2025-12-27T10:48:20.000Z",
          "lang": "en",
          "value": "VulDB entry last update"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "zzdzz (VulDB User)",
          "type": "reporter"
        }
      ]
    }
  }
}