CVE-2026-3007
Deferred Deferred - Pending Action
Stored XSS in Koollab LMS Courselet Enables Arbitrary JavaScript Execution

Publication date: 2026-04-23

Last updated on: 2026-05-05

Assigner: CSA

Description
Successful exploitation of the stored cross-site scripting (XSS) vulnerability could allow an attacker to execute arbitrary JavaScript on any user account that has access to Koollab LMS’ courselet feature.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-23
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-04-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
three_learning koollab_learning_management_system 5.3.2
three_learning koollab_learning_management_system 5.4.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stored cross-site scripting (XSS) issue found in Koollab Learning Management System (LMS) version 5.3.2. It allows an attacker to inject and execute arbitrary JavaScript code on any user account that has access to the LMS's courselet feature.


How can this vulnerability impact me? :

Exploitation of this vulnerability could allow an attacker to execute malicious JavaScript code within the context of a user's session. This can lead to unauthorized actions such as stealing user credentials, hijacking user sessions, or performing actions on behalf of the user without their consent.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the stored cross-site scripting (XSS) vulnerability in Koollab Learning Management System (LMS), users and administrators are strongly advised to upgrade to Koollab LMS version 5.4.0 immediately.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The stored cross-site scripting (XSS) vulnerability in Koollab LMS could allow attackers to execute arbitrary JavaScript on user accounts, potentially leading to unauthorized access or data exposure.

Such unauthorized access or data exposure could impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding user data and preventing unauthorized access.

However, the provided information does not explicitly detail the direct effects on compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart