CVE-2025-10411: Cross Site Scripting in itsourcecode E-Logbook with Health Monitoring System for COVID-19
A vulnerability was detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0. This issue affects some unknown processing of the file /stc-log-keeper/check_profile.php of the component POST Request Handler. The manipulation of the argument profile_id results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-10411 is a medium-severity Cross Site Scripting (XSS) vulnerability identified in version 1.0 of the itsourcecode E-Logbook with Health Monitoring System for COVID-19. The vulnerability resides in the POST request handler of the file /stc-log-keeper/check_profile.php, specifically in the processing of the 'profile_id' parameter. Improper sanitization or validation of this parameter allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This flaw can be exploited remotely without requiring authentication, and only requires user interaction (such as clicking a crafted link or submitting a form). The vulnerability does not impact confidentiality or availability directly but can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user, thus impacting integrity and user trust. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), no impact on confidentiality (VC:N), low impact on integrity (VI:L), no impact on availability (VA:N), no scope change (SC:N), no impact on security requirements (SI:N), no attack sophistication (SA:N), and exploit code is publicly available (E:P). Although no patches are currently linked, the public availability of exploit code increases the risk of exploitation in the wild. The vulnerability affects a specialized health monitoring system used for COVID-19 tracking and logging, which may contain sensitive health data and is likely deployed in healthcare or governmental environments managing pandemic response data.
Potential Impact
For European organizations, especially those involved in healthcare, public health monitoring, or governmental COVID-19 response, this vulnerability poses a risk of client-side script injection leading to session hijacking, unauthorized data access, or manipulation of health monitoring records. Such attacks could undermine the integrity of health data, erode public trust, and potentially disrupt critical health monitoring operations. Although the vulnerability does not directly compromise system availability or confidentiality at the server level, the ability to execute arbitrary scripts in users' browsers can facilitate phishing, credential theft, or lateral movement within internal networks. Given the sensitivity of health data and the regulatory environment in Europe (e.g., GDPR), exploitation could also lead to compliance violations and reputational damage. The remote and unauthenticated nature of the exploit increases the attack surface, especially if the system is accessible over the internet or within large intranets.
Mitigation Recommendations
Organizations using the affected itsourcecode E-Logbook with Health Monitoring System should prioritize the following mitigations: 1) Implement strict input validation and output encoding on the 'profile_id' parameter to neutralize malicious scripts, ideally using established libraries or frameworks that automatically handle XSS prevention. 2) Apply Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Conduct thorough code reviews and penetration testing focusing on all user input handling in the application. 4) If possible, restrict access to the affected component via network segmentation or VPN to reduce exposure. 5) Educate users about the risks of clicking untrusted links or submitting unverified forms related to the system. 6) Monitor logs and user activity for signs of exploitation attempts. 7) Engage with the vendor or development team to obtain or request a security patch or update addressing this vulnerability. 8) Consider deploying Web Application Firewalls (WAFs) with rules targeting XSS attack patterns on the affected endpoints. These steps go beyond generic advice by focusing on both immediate risk reduction and longer-term secure coding practices specific to this vulnerability.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-10411: Cross Site Scripting in itsourcecode E-Logbook with Health Monitoring System for COVID-19
Description
A vulnerability was detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0. This issue affects some unknown processing of the file /stc-log-keeper/check_profile.php of the component POST Request Handler. The manipulation of the argument profile_id results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10411 is a medium-severity Cross Site Scripting (XSS) vulnerability identified in version 1.0 of the itsourcecode E-Logbook with Health Monitoring System for COVID-19. The vulnerability resides in the POST request handler of the file /stc-log-keeper/check_profile.php, specifically in the processing of the 'profile_id' parameter. Improper sanitization or validation of this parameter allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This flaw can be exploited remotely without requiring authentication, and only requires user interaction (such as clicking a crafted link or submitting a form). The vulnerability does not impact confidentiality or availability directly but can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user, thus impacting integrity and user trust. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), no impact on confidentiality (VC:N), low impact on integrity (VI:L), no impact on availability (VA:N), no scope change (SC:N), no impact on security requirements (SI:N), no attack sophistication (SA:N), and exploit code is publicly available (E:P). Although no patches are currently linked, the public availability of exploit code increases the risk of exploitation in the wild. The vulnerability affects a specialized health monitoring system used for COVID-19 tracking and logging, which may contain sensitive health data and is likely deployed in healthcare or governmental environments managing pandemic response data.
Potential Impact
For European organizations, especially those involved in healthcare, public health monitoring, or governmental COVID-19 response, this vulnerability poses a risk of client-side script injection leading to session hijacking, unauthorized data access, or manipulation of health monitoring records. Such attacks could undermine the integrity of health data, erode public trust, and potentially disrupt critical health monitoring operations. Although the vulnerability does not directly compromise system availability or confidentiality at the server level, the ability to execute arbitrary scripts in users' browsers can facilitate phishing, credential theft, or lateral movement within internal networks. Given the sensitivity of health data and the regulatory environment in Europe (e.g., GDPR), exploitation could also lead to compliance violations and reputational damage. The remote and unauthenticated nature of the exploit increases the attack surface, especially if the system is accessible over the internet or within large intranets.
Mitigation Recommendations
Organizations using the affected itsourcecode E-Logbook with Health Monitoring System should prioritize the following mitigations: 1) Implement strict input validation and output encoding on the 'profile_id' parameter to neutralize malicious scripts, ideally using established libraries or frameworks that automatically handle XSS prevention. 2) Apply Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Conduct thorough code reviews and penetration testing focusing on all user input handling in the application. 4) If possible, restrict access to the affected component via network segmentation or VPN to reduce exposure. 5) Educate users about the risks of clicking untrusted links or submitting unverified forms related to the system. 6) Monitor logs and user activity for signs of exploitation attempts. 7) Engage with the vendor or development team to obtain or request a security patch or update addressing this vulnerability. 8) Consider deploying Web Application Firewalls (WAFs) with rules targeting XSS attack patterns on the affected endpoints. These steps go beyond generic advice by focusing on both immediate risk reduction and longer-term secure coding practices specific to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-13T19:56:31.764Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c7591939776bc2a1466a59
Added to database: 9/15/2025, 12:08:57 AM
Last enriched: 9/22/2025, 12:34:48 AM
Last updated: 10/30/2025, 8:39:40 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumCVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.