CVE-2025-10411: Cross Site Scripting in itsourcecode E-Logbook with Health Monitoring System for COVID-19
A vulnerability was detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0. This issue affects some unknown processing of the file /stc-log-keeper/check_profile.php of the component POST Request Handler. The manipulation of the argument profile_id results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-10411 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the itsourcecode E-Logbook with Health Monitoring System for COVID-19. The vulnerability resides in the POST request handler of the /stc-log-keeper/check_profile.php file, specifically in the processing of the 'profile_id' parameter. Improper sanitization or validation of this input allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This vulnerability can be exploited remotely without requiring authentication, and user interaction is necessary to trigger the malicious payload (e.g., clicking a crafted link or visiting a malicious page). The CVSS 4.0 base score is 5.3, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required. The impact primarily affects the integrity of the victim's browsing session by enabling script execution, which can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability does not affect confidentiality or availability directly, and the scope is limited to the affected web application. Although no known exploits are currently in the wild, the exploit code is publicly available, increasing the risk of exploitation. This vulnerability is particularly concerning given the sensitive nature of health monitoring systems used during the COVID-19 pandemic, where compromised user data or session hijacking could have serious privacy and operational consequences.
Potential Impact
For European organizations, especially those involved in healthcare or public health monitoring, this vulnerability poses a risk to the confidentiality and integrity of sensitive health data. Exploitation could lead to unauthorized access to user sessions, enabling attackers to impersonate users, manipulate health records, or inject misleading information. This could undermine trust in digital health systems and potentially disrupt COVID-19 monitoring efforts. Additionally, given the remote exploitability and public availability of the exploit, there is a heightened risk of widespread attacks targeting healthcare providers, government health agencies, or organizations managing COVID-19 data. The impact extends beyond individual users to organizational reputation and compliance with stringent European data protection regulations such as GDPR, which mandates the protection of personal health information. Any breach or data manipulation could result in legal penalties and loss of public confidence.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize patching or upgrading the itsourcecode E-Logbook with Health Monitoring System to a version where the XSS flaw is fixed. If an official patch is not yet available, implement input validation and output encoding on the 'profile_id' parameter to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser. Additionally, enable HTTP-only and secure flags on cookies to protect session tokens from theft via XSS. Conduct thorough security testing of the application, including automated and manual XSS detection techniques, to identify and remediate similar issues. Educate users about the risks of clicking unknown links and implement web application firewalls (WAF) with rules to detect and block XSS payloads targeting this endpoint. Regularly monitor logs for suspicious activity related to the vulnerable parameter and maintain an incident response plan tailored to web application attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-10411: Cross Site Scripting in itsourcecode E-Logbook with Health Monitoring System for COVID-19
Description
A vulnerability was detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0. This issue affects some unknown processing of the file /stc-log-keeper/check_profile.php of the component POST Request Handler. The manipulation of the argument profile_id results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10411 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the itsourcecode E-Logbook with Health Monitoring System for COVID-19. The vulnerability resides in the POST request handler of the /stc-log-keeper/check_profile.php file, specifically in the processing of the 'profile_id' parameter. Improper sanitization or validation of this input allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This vulnerability can be exploited remotely without requiring authentication, and user interaction is necessary to trigger the malicious payload (e.g., clicking a crafted link or visiting a malicious page). The CVSS 4.0 base score is 5.3, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required. The impact primarily affects the integrity of the victim's browsing session by enabling script execution, which can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability does not affect confidentiality or availability directly, and the scope is limited to the affected web application. Although no known exploits are currently in the wild, the exploit code is publicly available, increasing the risk of exploitation. This vulnerability is particularly concerning given the sensitive nature of health monitoring systems used during the COVID-19 pandemic, where compromised user data or session hijacking could have serious privacy and operational consequences.
Potential Impact
For European organizations, especially those involved in healthcare or public health monitoring, this vulnerability poses a risk to the confidentiality and integrity of sensitive health data. Exploitation could lead to unauthorized access to user sessions, enabling attackers to impersonate users, manipulate health records, or inject misleading information. This could undermine trust in digital health systems and potentially disrupt COVID-19 monitoring efforts. Additionally, given the remote exploitability and public availability of the exploit, there is a heightened risk of widespread attacks targeting healthcare providers, government health agencies, or organizations managing COVID-19 data. The impact extends beyond individual users to organizational reputation and compliance with stringent European data protection regulations such as GDPR, which mandates the protection of personal health information. Any breach or data manipulation could result in legal penalties and loss of public confidence.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize patching or upgrading the itsourcecode E-Logbook with Health Monitoring System to a version where the XSS flaw is fixed. If an official patch is not yet available, implement input validation and output encoding on the 'profile_id' parameter to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser. Additionally, enable HTTP-only and secure flags on cookies to protect session tokens from theft via XSS. Conduct thorough security testing of the application, including automated and manual XSS detection techniques, to identify and remediate similar issues. Educate users about the risks of clicking unknown links and implement web application firewalls (WAF) with rules to detect and block XSS payloads targeting this endpoint. Regularly monitor logs for suspicious activity related to the vulnerable parameter and maintain an incident response plan tailored to web application attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-13T19:56:31.764Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c7591939776bc2a1466a59
Added to database: 9/15/2025, 12:08:57 AM
Last enriched: 9/15/2025, 12:09:43 AM
Last updated: 9/15/2025, 2:47:51 AM
Views: 3
Related Threats
CVE-2025-41713: CWE-1188 Insecure Default Initialization of Resource in WAGO CC100 0751-9301
MediumCVE-2025-10433: Deserialization in 1Panel-dev MaxKB
MediumCVE-2025-10432: Stack-based Buffer Overflow in Tenda AC1206
CriticalCVE-2025-10431: SQL Injection in SourceCodester Pet Grooming Management Software
MediumCVE-2025-10430: SQL Injection in SourceCodester Pet Grooming Management Software
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.