VYPR
Medium severity6.4NVD Advisory· Published May 10, 2026· Updated May 12, 2026

CVE-2021-47907

CVE-2021-47907

Description

Rocket LMS 1.1 contains a persistent cross-site scripting vulnerability in the support ticket module that allows authenticated users to inject malicious script code through the title parameter. Attackers can submit support tickets with embedded HTML/JavaScript payloads that execute in the browsers of other users viewing the message history, enabling session hijacking and phishing attacks.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Rocket LMS 1.1 has a persistent XSS in the support ticket title field, enabling authenticated attackers to execute scripts in other users' browsers.

Vulnerability

Overview

Rocket LMS 1.1 contains a persistent cross-site scripting (XSS) vulnerability in the support ticket module. The root cause is improper neutralization of user-supplied input in the title parameter when creating support tickets. The application fails to sanitize or encode HTML/JavaScript before storing it, allowing arbitrary script injection [1][2].

Exploitation

An authenticated attacker can submit a support ticket with a malicious payload embedded in the title field. When any other user (including administrators) views the ticket history, the stored payload executes in their browser. No special privileges beyond a valid user account are required, and the attack is network-based with low complexity [2].

Impact

Successful exploitation allows the attacker to perform session hijacking, steal cookies, conduct phishing attacks, or deface the application within the victim's session context. The CVSS v3 score of 6.4 reflects the medium severity due to the need for authentication and user interaction [2].

Mitigation

As of the public disclosure date (December 2021), no official patch was available from the vendor. Users are advised to implement strict input validation and output encoding for the title parameter, or upgrade to a later version if one becomes available [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.