CVE-2025-10065: Cross Site Scripting in itsourcecode POS Point of Sale System
A weakness has been identified in itsourcecode POS Point of Sale System 1.0. Impacted is an unknown function of the file /inventory/main/vendors/datatables/unit_testing/templates/dom_data_th.php. This manipulation of the argument scripts causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-10065 is a cross-site scripting (XSS) vulnerability identified in the itsourcecode POS Point of Sale System version 1.0. The vulnerability exists in an unspecified function within the file /inventory/main/vendors/datatables/unit_testing/templates/dom_data_th.php. The issue arises from improper sanitization or validation of the 'scripts' argument, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring any authentication, and user interaction is needed to trigger the malicious script execution (e.g., by a user viewing a crafted page). The CVSS 4.0 score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary. The impact primarily affects the integrity and confidentiality of the affected system by enabling script injection, which could lead to session hijacking, defacement, or redirection to malicious sites. Availability impact is minimal. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no known active exploits in the wild have been reported yet. The vulnerability affects only version 1.0 of the itsourcecode POS system, which is a specialized point of sale software used in retail environments. Given the POS context, exploitation could lead to theft of sensitive customer data or manipulation of transaction data if combined with other vulnerabilities or social engineering.
Potential Impact
For European organizations, especially retailers and businesses using the itsourcecode POS system version 1.0, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the POS system's web interface, potentially leading to theft of payment or customer data, session hijacking of administrative users, or unauthorized manipulation of inventory or sales data. This could result in financial losses, reputational damage, and regulatory compliance issues under GDPR due to potential exposure of personal data. The remote exploitability and public availability of exploit code increase the urgency for mitigation. However, the requirement for user interaction (e.g., an employee clicking a malicious link or viewing a crafted page) somewhat limits the attack surface. Still, phishing or social engineering campaigns targeting employees could facilitate exploitation. The impact on availability is low, but integrity and confidentiality risks are significant in the retail context. Organizations relying on this POS system should prioritize addressing this vulnerability to prevent potential data breaches and operational disruptions.
Mitigation Recommendations
1. Immediate mitigation should include applying any available patches or updates from itsourcecode vendor; if no patch is currently available, consider temporary workarounds such as disabling or restricting access to the vulnerable component (/inventory/main/vendors/datatables/unit_testing/templates/dom_data_th.php) or sanitizing inputs at the web server or application firewall level. 2. Implement strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the POS system's web interface. 3. Employ Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the vulnerable parameter. 4. Conduct employee awareness training to reduce the risk of social engineering attacks that could trigger the vulnerability. 5. Monitor logs and network traffic for suspicious activity related to the POS system, especially unusual requests to the vulnerable script or unexpected script execution. 6. If feasible, isolate the POS system network segment from the broader corporate network to limit lateral movement in case of compromise. 7. Plan for an upgrade or migration to a newer, patched version of the POS system or alternative software if the vendor does not provide timely fixes.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-10065: Cross Site Scripting in itsourcecode POS Point of Sale System
Description
A weakness has been identified in itsourcecode POS Point of Sale System 1.0. Impacted is an unknown function of the file /inventory/main/vendors/datatables/unit_testing/templates/dom_data_th.php. This manipulation of the argument scripts causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10065 is a cross-site scripting (XSS) vulnerability identified in the itsourcecode POS Point of Sale System version 1.0. The vulnerability exists in an unspecified function within the file /inventory/main/vendors/datatables/unit_testing/templates/dom_data_th.php. The issue arises from improper sanitization or validation of the 'scripts' argument, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring any authentication, and user interaction is needed to trigger the malicious script execution (e.g., by a user viewing a crafted page). The CVSS 4.0 score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary. The impact primarily affects the integrity and confidentiality of the affected system by enabling script injection, which could lead to session hijacking, defacement, or redirection to malicious sites. Availability impact is minimal. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no known active exploits in the wild have been reported yet. The vulnerability affects only version 1.0 of the itsourcecode POS system, which is a specialized point of sale software used in retail environments. Given the POS context, exploitation could lead to theft of sensitive customer data or manipulation of transaction data if combined with other vulnerabilities or social engineering.
Potential Impact
For European organizations, especially retailers and businesses using the itsourcecode POS system version 1.0, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the POS system's web interface, potentially leading to theft of payment or customer data, session hijacking of administrative users, or unauthorized manipulation of inventory or sales data. This could result in financial losses, reputational damage, and regulatory compliance issues under GDPR due to potential exposure of personal data. The remote exploitability and public availability of exploit code increase the urgency for mitigation. However, the requirement for user interaction (e.g., an employee clicking a malicious link or viewing a crafted page) somewhat limits the attack surface. Still, phishing or social engineering campaigns targeting employees could facilitate exploitation. The impact on availability is low, but integrity and confidentiality risks are significant in the retail context. Organizations relying on this POS system should prioritize addressing this vulnerability to prevent potential data breaches and operational disruptions.
Mitigation Recommendations
1. Immediate mitigation should include applying any available patches or updates from itsourcecode vendor; if no patch is currently available, consider temporary workarounds such as disabling or restricting access to the vulnerable component (/inventory/main/vendors/datatables/unit_testing/templates/dom_data_th.php) or sanitizing inputs at the web server or application firewall level. 2. Implement strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the POS system's web interface. 3. Employ Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the vulnerable parameter. 4. Conduct employee awareness training to reduce the risk of social engineering attacks that could trigger the vulnerability. 5. Monitor logs and network traffic for suspicious activity related to the POS system, especially unusual requests to the vulnerable script or unexpected script execution. 6. If feasible, isolate the POS system network segment from the broader corporate network to limit lateral movement in case of compromise. 7. Plan for an upgrade or migration to a newer, patched version of the POS system or alternative software if the vendor does not provide timely fixes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-06T07:49:19.580Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bcd61ca2c363fb160852ae
Added to database: 9/7/2025, 12:47:24 AM
Last enriched: 9/15/2025, 12:49:53 AM
Last updated: 10/22/2025, 3:38:06 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62775: CWE-669 Incorrect Resource Transfer Between Spheres in Mercku M6a
HighCVE-2025-62774: CWE-331 Insufficient Entropy in Mercku M6a
LowCVE-2025-62773: CWE-912 Hidden Functionality in Mercku M6a
LowCVE-2025-62772: CWE-305 Authentication Bypass by Primary Weakness in Mercku M6a
LowCVE-2025-62771: CWE-352 Cross-Site Request Forgery (CSRF) in Mercku M6a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.