CVE-2025-10614: Cross Site Scripting in itsourcecode E-Logbook with Health Monitoring System for COVID-19
A vulnerability was determined in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0 on COVID. This affects an unknown function of the file /print_reports_prev.php. Executing manipulation of the argument profile_id can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-10614 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the itsourcecode E-Logbook with Health Monitoring System for COVID-19. The vulnerability exists in the /print_reports_prev.php file, specifically in the handling of the 'profile_id' parameter. An attacker can manipulate this argument to inject malicious scripts that execute in the context of the victim's browser. This type of vulnerability allows an attacker to perform actions such as stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions on behalf of the user. The vulnerability is remotely exploitable without requiring authentication, although it requires user interaction (e.g., the victim must visit a crafted URL). The CVSS 4.0 base score is 5.3, indicating a medium severity level, with the vector showing network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity but no impact on confidentiality or availability. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. Given the product's focus on COVID-19 health monitoring, it is likely used by healthcare providers or organizations involved in pandemic response, making the confidentiality and integrity of health data a concern. The vulnerability could be leveraged to target users of the system, potentially leading to phishing or session hijacking attacks within the healthcare context.
Potential Impact
For European organizations, especially those involved in healthcare and pandemic management, this vulnerability poses a risk to the integrity and trustworthiness of health monitoring data. Exploitation could lead to unauthorized actions performed in the context of legitimate users, potentially disrupting health monitoring workflows or exposing sensitive health-related information indirectly through session hijacking or social engineering. While the direct confidentiality impact is limited, the integrity impact could affect decision-making based on compromised data. Additionally, the presence of malicious scripts could undermine user trust and compliance with data protection regulations such as GDPR. The medium severity suggests that while the threat is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities. The remote exploitability without authentication increases the attack surface, especially if the system is accessible over the internet or within large organizational networks.
Mitigation Recommendations
1. Immediate patching or upgrading to a fixed version of the E-Logbook system once available is the most effective mitigation. 2. In the absence of an official patch, implement input validation and output encoding on the 'profile_id' parameter to neutralize malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the application context. 4. Conduct a thorough security review of all user input handling in the application, focusing on parameters that are reflected in responses. 5. Educate users to be cautious about clicking on unknown or suspicious links related to the system. 6. Monitor web server logs for unusual requests targeting the vulnerable parameter to detect potential exploitation attempts. 7. Restrict access to the application to trusted networks or through VPNs to reduce exposure. 8. Implement multi-factor authentication and session management best practices to limit the impact of session hijacking if it occurs.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-10614: Cross Site Scripting in itsourcecode E-Logbook with Health Monitoring System for COVID-19
Description
A vulnerability was determined in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0 on COVID. This affects an unknown function of the file /print_reports_prev.php. Executing manipulation of the argument profile_id can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-10614 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the itsourcecode E-Logbook with Health Monitoring System for COVID-19. The vulnerability exists in the /print_reports_prev.php file, specifically in the handling of the 'profile_id' parameter. An attacker can manipulate this argument to inject malicious scripts that execute in the context of the victim's browser. This type of vulnerability allows an attacker to perform actions such as stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions on behalf of the user. The vulnerability is remotely exploitable without requiring authentication, although it requires user interaction (e.g., the victim must visit a crafted URL). The CVSS 4.0 base score is 5.3, indicating a medium severity level, with the vector showing network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity but no impact on confidentiality or availability. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. Given the product's focus on COVID-19 health monitoring, it is likely used by healthcare providers or organizations involved in pandemic response, making the confidentiality and integrity of health data a concern. The vulnerability could be leveraged to target users of the system, potentially leading to phishing or session hijacking attacks within the healthcare context.
Potential Impact
For European organizations, especially those involved in healthcare and pandemic management, this vulnerability poses a risk to the integrity and trustworthiness of health monitoring data. Exploitation could lead to unauthorized actions performed in the context of legitimate users, potentially disrupting health monitoring workflows or exposing sensitive health-related information indirectly through session hijacking or social engineering. While the direct confidentiality impact is limited, the integrity impact could affect decision-making based on compromised data. Additionally, the presence of malicious scripts could undermine user trust and compliance with data protection regulations such as GDPR. The medium severity suggests that while the threat is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities. The remote exploitability without authentication increases the attack surface, especially if the system is accessible over the internet or within large organizational networks.
Mitigation Recommendations
1. Immediate patching or upgrading to a fixed version of the E-Logbook system once available is the most effective mitigation. 2. In the absence of an official patch, implement input validation and output encoding on the 'profile_id' parameter to neutralize malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the application context. 4. Conduct a thorough security review of all user input handling in the application, focusing on parameters that are reflected in responses. 5. Educate users to be cautious about clicking on unknown or suspicious links related to the system. 6. Monitor web server logs for unusual requests targeting the vulnerable parameter to detect potential exploitation attempts. 7. Restrict access to the application to trusted networks or through VPNs to reduce exposure. 8. Implement multi-factor authentication and session management best practices to limit the impact of session hijacking if it occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-17T11:13:07.999Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cb0df12a0094034ff87a47
Added to database: 9/17/2025, 7:37:21 PM
Last enriched: 9/17/2025, 7:38:10 PM
Last updated: 9/19/2025, 12:08:58 AM
Views: 8
Related Threats
CVE-2025-7937: CWE-347 Improper Verification of Cryptographic Signature in SMCI MBD-X12STW
MediumCVE-2025-59714: CWE-863 Incorrect Authorization in Internet2 Grouper
MediumCVE-2025-59713: CWE-502 Deserialization of Untrusted Data in snipeitapp Snipe-IT
MediumCVE-2025-59712: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in snipeitapp Snipe-IT
MediumCVE-2025-10690: CWE-862 Missing Authorization in Bearsthemes Goza - Nonprofit Charity WordPress Theme
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.