Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11067: Cross Site Scripting in Projectworlds Visitor Management System

0
Medium
VulnerabilityCVE-2025-11067cvecve-2025-11067
Published: Sat Sep 27 2025 (09/27/2025, 15:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Projectworlds
Product: Visitor Management System

Description

A vulnerability has been found in Projectworlds Visitor Management System 1.0. Affected is an unknown function of the file /myform.php of the component Add Visitor Page. The manipulation of the argument Name leads to cross site scripting. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 10/05/2025, 00:51:19 UTC

Technical Analysis

CVE-2025-11067 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the Projectworlds Visitor Management System, specifically in the /myform.php file within the Add Visitor Page component. The vulnerability arises from improper sanitization or validation of the 'Name' parameter, which allows an attacker to inject malicious scripts. This vulnerability is remotely exploitable without authentication, meaning an attacker can craft a specially crafted request to the vulnerable endpoint and execute arbitrary JavaScript code in the context of the victim's browser. The CVSS 4.0 vector indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:H but note this is high privileges, which contradicts the description; however, the description states remote exploitation is possible without authentication), and user interaction is required (UI:P). The impact on confidentiality is none, integrity is low, and availability is none. The vulnerability does not affect system confidentiality or availability but can lead to session hijacking, defacement, or redirection to malicious sites, impacting user trust and potentially leading to further attacks such as credential theft or malware deployment. Although no patches are currently linked, the vulnerability has been publicly disclosed, increasing the risk of exploitation. No known exploits are reported in the wild yet. The vulnerability affects only version 1.0 of the product, which may limit the scope depending on the deployment of this specific version.

Potential Impact

For European organizations using Projectworlds Visitor Management System 1.0, this XSS vulnerability poses a moderate risk primarily to the integrity of user interactions and the security of session data. Visitor management systems often handle sensitive visitor information and access control, so exploitation could lead to unauthorized actions or data leakage. The impact is heightened in environments where visitor data is linked to internal systems or where visitors have access to sensitive areas. Additionally, successful exploitation could erode trust in the organization's security posture and potentially lead to compliance issues under regulations such as GDPR if personal data is compromised. The requirement for user interaction (e.g., a visitor clicking a malicious link) means social engineering could be used to facilitate attacks. However, the absence of known active exploits and the medium severity rating suggest that while the threat is real, it is not currently critical. Organizations relying on this system should assess their exposure and prioritize remediation accordingly.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are running Projectworlds Visitor Management System version 1.0 and plan for an immediate upgrade once a patch is available. In the absence of an official patch, organizations can implement input validation and output encoding on the 'Name' parameter within /myform.php to neutralize malicious scripts. Web Application Firewalls (WAFs) can be configured with custom rules to detect and block typical XSS payloads targeting this endpoint. Additionally, organizations should educate staff and visitors about the risks of clicking suspicious links and implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Regular security audits and penetration testing focused on visitor management systems can help identify similar vulnerabilities. Finally, monitoring logs for unusual activity related to the Add Visitor Page can provide early detection of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T12:04:39.355Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d87cd15d6228f86ddc9248

Added to database: 9/28/2025, 12:09:53 AM

Last enriched: 10/5/2025, 12:51:19 AM

Last updated: 10/7/2025, 1:50:50 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats