Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10065: Cross Site Scripting in itsourcecode POS Point of Sale System

0
Medium
VulnerabilityCVE-2025-10065cvecve-2025-10065
Published: Sun Sep 07 2025 (09/07/2025, 00:32:06 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: POS Point of Sale System

Description

A weakness has been identified in itsourcecode POS Point of Sale System 1.0. Impacted is an unknown function of the file /inventory/main/vendors/datatables/unit_testing/templates/dom_data_th.php. This manipulation of the argument scripts causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 09/15/2025, 00:49:53 UTC

Technical Analysis

CVE-2025-10065 is a cross-site scripting (XSS) vulnerability identified in the itsourcecode POS Point of Sale System version 1.0. The vulnerability exists in an unspecified function within the file /inventory/main/vendors/datatables/unit_testing/templates/dom_data_th.php. The issue arises from improper sanitization or validation of the 'scripts' argument, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring any authentication, and user interaction is needed to trigger the malicious script execution (e.g., by a user viewing a crafted page). The CVSS 4.0 score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary. The impact primarily affects the integrity and confidentiality of the affected system by enabling script injection, which could lead to session hijacking, defacement, or redirection to malicious sites. Availability impact is minimal. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no known active exploits in the wild have been reported yet. The vulnerability affects only version 1.0 of the itsourcecode POS system, which is a specialized point of sale software used in retail environments. Given the POS context, exploitation could lead to theft of sensitive customer data or manipulation of transaction data if combined with other vulnerabilities or social engineering.

Potential Impact

For European organizations, especially retailers and businesses using the itsourcecode POS system version 1.0, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the POS system's web interface, potentially leading to theft of payment or customer data, session hijacking of administrative users, or unauthorized manipulation of inventory or sales data. This could result in financial losses, reputational damage, and regulatory compliance issues under GDPR due to potential exposure of personal data. The remote exploitability and public availability of exploit code increase the urgency for mitigation. However, the requirement for user interaction (e.g., an employee clicking a malicious link or viewing a crafted page) somewhat limits the attack surface. Still, phishing or social engineering campaigns targeting employees could facilitate exploitation. The impact on availability is low, but integrity and confidentiality risks are significant in the retail context. Organizations relying on this POS system should prioritize addressing this vulnerability to prevent potential data breaches and operational disruptions.

Mitigation Recommendations

1. Immediate mitigation should include applying any available patches or updates from itsourcecode vendor; if no patch is currently available, consider temporary workarounds such as disabling or restricting access to the vulnerable component (/inventory/main/vendors/datatables/unit_testing/templates/dom_data_th.php) or sanitizing inputs at the web server or application firewall level. 2. Implement strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the POS system's web interface. 3. Employ Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the vulnerable parameter. 4. Conduct employee awareness training to reduce the risk of social engineering attacks that could trigger the vulnerability. 5. Monitor logs and network traffic for suspicious activity related to the POS system, especially unusual requests to the vulnerable script or unexpected script execution. 6. If feasible, isolate the POS system network segment from the broader corporate network to limit lateral movement in case of compromise. 7. Plan for an upgrade or migration to a newer, patched version of the POS system or alternative software if the vendor does not provide timely fixes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-06T07:49:19.580Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bcd61ca2c363fb160852ae

Added to database: 9/7/2025, 12:47:24 AM

Last enriched: 9/15/2025, 12:49:53 AM

Last updated: 10/22/2025, 3:38:06 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats