CVE-2025-10075: Cross Site Scripting in SourceCodester Online Polling System
A security flaw has been discovered in SourceCodester Online Polling System 1.0. The impacted element is an unknown function of the file /manage-profile.php. The manipulation of the argument firstname results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-10075 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Online Polling System. The vulnerability exists in the /manage-profile.php file, specifically in the handling of the 'firstname' parameter. An attacker can remotely manipulate this parameter to inject malicious scripts into the web application. This flaw allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser session without requiring authentication, although user interaction is needed to trigger the malicious script. The vulnerability is classified as reflected or stored XSS depending on the application context, but the exact type is unspecified. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The impact primarily affects confidentiality and integrity by enabling session hijacking, credential theft, or defacement. Availability impact is low. The exploit code has been publicly released, increasing the risk of exploitation, although no confirmed active exploitation in the wild has been reported yet. The vulnerability stems from insufficient input validation or output encoding of user-supplied data in the firstname parameter, allowing script injection. Since the polling system is a web-based application likely used for gathering user opinions or votes, exploitation could lead to manipulation of poll results, phishing attacks against users, or distribution of malware via injected scripts. The lack of a vendor patch link indicates that a fix may not yet be available, emphasizing the need for immediate mitigation steps by administrators.
Potential Impact
For European organizations using the SourceCodester Online Polling System 1.0, this vulnerability poses a moderate risk. Polling systems are often used in corporate, governmental, or community environments to collect feedback or votes, making them attractive targets for attackers seeking to influence outcomes or gather sensitive user data. Exploitation could lead to unauthorized access to user sessions, theft of credentials, or distribution of malicious payloads to users, undermining trust and potentially violating data protection regulations such as GDPR. The manipulation of poll data could affect decision-making processes or public opinion, especially in politically sensitive contexts. Additionally, compromised polling platforms could serve as entry points for broader attacks within an organization's network. The medium severity rating reflects that while the vulnerability requires user interaction and does not grant direct system control, the potential for reputational damage and data compromise is significant. Organizations in sectors such as public administration, political organizations, and enterprises relying on online polling should be particularly vigilant.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, apply strict input validation and output encoding on the 'firstname' parameter in /manage-profile.php to neutralize script injection attempts. Web application firewalls (WAFs) should be configured to detect and block typical XSS payloads targeting this parameter. Administrators should review and restrict user input fields to allow only expected characters (e.g., alphabets) and employ Content Security Policy (CSP) headers to limit script execution sources. User awareness campaigns can reduce the risk by educating users not to click suspicious links or submit untrusted input. Monitoring web server logs for unusual requests to /manage-profile.php can help detect exploitation attempts. If possible, isolate the polling system from critical internal networks to limit lateral movement. Organizations should also track vendor communications for patches and plan timely updates once available. Finally, consider migrating to more secure, actively maintained polling platforms if feasible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-10075: Cross Site Scripting in SourceCodester Online Polling System
Description
A security flaw has been discovered in SourceCodester Online Polling System 1.0. The impacted element is an unknown function of the file /manage-profile.php. The manipulation of the argument firstname results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10075 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Online Polling System. The vulnerability exists in the /manage-profile.php file, specifically in the handling of the 'firstname' parameter. An attacker can remotely manipulate this parameter to inject malicious scripts into the web application. This flaw allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser session without requiring authentication, although user interaction is needed to trigger the malicious script. The vulnerability is classified as reflected or stored XSS depending on the application context, but the exact type is unspecified. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The impact primarily affects confidentiality and integrity by enabling session hijacking, credential theft, or defacement. Availability impact is low. The exploit code has been publicly released, increasing the risk of exploitation, although no confirmed active exploitation in the wild has been reported yet. The vulnerability stems from insufficient input validation or output encoding of user-supplied data in the firstname parameter, allowing script injection. Since the polling system is a web-based application likely used for gathering user opinions or votes, exploitation could lead to manipulation of poll results, phishing attacks against users, or distribution of malware via injected scripts. The lack of a vendor patch link indicates that a fix may not yet be available, emphasizing the need for immediate mitigation steps by administrators.
Potential Impact
For European organizations using the SourceCodester Online Polling System 1.0, this vulnerability poses a moderate risk. Polling systems are often used in corporate, governmental, or community environments to collect feedback or votes, making them attractive targets for attackers seeking to influence outcomes or gather sensitive user data. Exploitation could lead to unauthorized access to user sessions, theft of credentials, or distribution of malicious payloads to users, undermining trust and potentially violating data protection regulations such as GDPR. The manipulation of poll data could affect decision-making processes or public opinion, especially in politically sensitive contexts. Additionally, compromised polling platforms could serve as entry points for broader attacks within an organization's network. The medium severity rating reflects that while the vulnerability requires user interaction and does not grant direct system control, the potential for reputational damage and data compromise is significant. Organizations in sectors such as public administration, political organizations, and enterprises relying on online polling should be particularly vigilant.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, apply strict input validation and output encoding on the 'firstname' parameter in /manage-profile.php to neutralize script injection attempts. Web application firewalls (WAFs) should be configured to detect and block typical XSS payloads targeting this parameter. Administrators should review and restrict user input fields to allow only expected characters (e.g., alphabets) and employ Content Security Policy (CSP) headers to limit script execution sources. User awareness campaigns can reduce the risk by educating users not to click suspicious links or submit untrusted input. Monitoring web server logs for unusual requests to /manage-profile.php can help detect exploitation attempts. If possible, isolate the polling system from critical internal networks to limit lateral movement. Organizations should also track vendor communications for patches and plan timely updates once available. Finally, consider migrating to more secure, actively maintained polling platforms if feasible.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-07T11:48:45.410Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68be280ae3f0bafba8aaad7c
Added to database: 9/8/2025, 12:49:14 AM
Last enriched: 9/8/2025, 1:03:13 AM
Last updated: 9/8/2025, 10:33:29 AM
Views: 5
Related Threats
Windows Defender's vulnerability: Break The Protective Shell Of Windows Defender With The Folder Redirect Technique
MediumCVE-2025-36853: CWE-190: Integer Overflow or Wraparound in Microsoft .NET 6.0
HighCVE-2025-36854: CWE-416: Use After Free in Microsoft .NET 6.0
HighCVE-2025-36855: CWE-126: Buffer Over-read in Microsoft .NET 6.0
HighCVE-2025-22956: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.