Skip to main content

CVE-2025-10088: Cross Site Scripting in SourceCodester Time Tracker

Medium
VulnerabilityCVE-2025-10088cvecve-2025-10088
Published: Mon Sep 08 2025 (09/08/2025, 07:02:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Time Tracker

Description

A vulnerability was detected in SourceCodester Time Tracker 1.0. The affected element is an unknown function of the file /index.html. Performing manipulation of the argument project-name results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/08/2025, 07:31:27 UTC

Technical Analysis

CVE-2025-10088 is a cross-site scripting (XSS) vulnerability identified in SourceCodester Time Tracker version 1.0. The vulnerability resides in an unspecified function within the /index.html file, where manipulation of the 'project-name' argument allows an attacker to inject malicious scripts. This vulnerability is remotely exploitable without requiring authentication, although it does require some user interaction (UI:P) for the attack to succeed. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges required (PR:L). The impact primarily affects the integrity and availability of the application, with limited impact on confidentiality. The vulnerability does not involve any scope change or additional security requirements. While no public exploits are currently known in the wild, the exploit details have been made public, increasing the risk of exploitation. XSS vulnerabilities like this can be leveraged to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Since the vulnerability is in a time tracking application, attackers could target organizations relying on this software for project management and time logging, potentially compromising user sessions or injecting misleading data via the interface.

Potential Impact

For European organizations using SourceCodester Time Tracker 1.0, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized script execution in users' browsers, enabling attackers to steal session cookies, perform actions on behalf of users, or deliver malware. This could disrupt internal project management workflows, cause data integrity issues, and damage organizational reputation. Given that time tracking tools often integrate with payroll and billing systems, compromised data could lead to financial discrepancies or fraud. Additionally, if attackers leverage the XSS to escalate attacks, they might gain further access to internal networks. The medium severity suggests that while the vulnerability is not critical, it still requires prompt attention to prevent exploitation, especially in environments with high user interaction or where the application is exposed to the internet.

Mitigation Recommendations

Organizations should immediately assess their use of SourceCodester Time Tracker 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement input validation and output encoding on the 'project-name' parameter to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Additionally, restrict access to the application to trusted networks or VPNs to reduce exposure. Regularly monitor web application logs for suspicious input patterns targeting the 'project-name' parameter. Educate users about the risks of clicking on suspicious links that could exploit XSS vulnerabilities. Finally, consider deploying web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting this application.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-07T18:48:53.428Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68be82c4d5a2966cfc7cc0c2

Added to database: 9/8/2025, 7:16:20 AM

Last enriched: 9/8/2025, 7:31:27 AM

Last updated: 9/8/2025, 10:37:46 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats