CVE-2025-11304
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-05

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in CodeCanyon/ui-lib Mentor LMS up to 1.1.1. Affected by this vulnerability is an unknown functionality of the component API. Executing manipulation can lead to permissive cross-domain policy with untrusted domains. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-05
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-10-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
codecanyon mentor_lms 1.1.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-942 The product uses a web-client protection mechanism such as a Content Security Policy (CSP) or cross-domain policy file, but the policy includes untrusted domains with which the web client is allowed to communicate.
CWE-346 The product does not properly verify that the source of data or communication is valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a flaw in the CodeCanyon/ui-lib Mentor LMS up to version 1.1.1, specifically in an unknown functionality of the API component. It allows an attacker to manipulate the system to create a permissive cross-domain policy that includes untrusted domains. This means that malicious websites could potentially interact with the application in ways that are normally restricted, leading to security risks. The attack can be launched remotely, and an exploit has already been published.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing attackers from untrusted domains to bypass normal cross-domain restrictions. This could lead to unauthorized access to sensitive data, manipulation of application behavior, or other security breaches. Since the attack can be performed remotely, it increases the risk of exploitation without physical access to the system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart