Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11425: Cross Site Scripting in projectworlds Advanced Library Management System

0
Medium
VulnerabilityCVE-2025-11425cvecve-2025-11425
Published: Wed Oct 08 2025 (10/08/2025, 02:32:05 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: Advanced Library Management System

Description

A vulnerability was identified in projectworlds Advanced Library Management System 1.0. Affected is an unknown function of the file /edit_admin.php. The manipulation of the argument firstname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Other parameters might be affected as well.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:57:49 UTC

Technical Analysis

CVE-2025-11425 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the projectworlds Advanced Library Management System. The flaw exists in the /edit_admin.php script, where the 'firstname' parameter is not properly sanitized or encoded before being reflected in the web page output. This allows remote attackers to inject arbitrary JavaScript code that executes in the context of the victim's browser. The vulnerability can be triggered remotely without authentication, but requires user interaction, typically an administrator clicking a maliciously crafted link. The CVSS 4.0 base score is 4.8 (medium severity), reflecting low impact on confidentiality and availability but some impact on integrity via script injection. The vulnerability could be exploited to steal session cookies, perform unauthorized actions, or conduct phishing attacks targeting administrative users. The mention that other parameters might also be affected suggests a systemic input validation weakness in the application. No patches or official fixes have been published yet, and no active exploitation has been observed in the wild. However, the public availability of exploit code increases the risk of opportunistic attacks. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially those managing sensitive administrative functions.

Potential Impact

If exploited, this XSS vulnerability could allow attackers to execute arbitrary scripts in the context of administrative users, potentially leading to session hijacking, unauthorized actions, or redirection to malicious sites. This compromises the integrity of the administrative interface and could indirectly affect confidentiality if session tokens or credentials are stolen. Availability impact is minimal as the vulnerability does not directly disrupt service. However, successful attacks could undermine trust in the library management system and lead to administrative account compromise. Organizations relying on this system for managing library resources and user data may face operational disruptions and reputational damage. The fact that other parameters might be vulnerable increases the attack surface, potentially enabling more extensive exploitation. Since the exploit requires user interaction but no authentication, social engineering could be used to target administrators. The medium CVSS score reflects moderate risk but should not be underestimated given the administrative context.

Mitigation Recommendations

Organizations should immediately review and sanitize all user input parameters in the /edit_admin.php script, especially 'firstname' and other potentially affected fields, using proper server-side input validation and output encoding techniques such as HTML entity encoding. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser. Restrict access to the administrative interface by IP whitelisting or VPN to reduce exposure. Educate administrators about the risks of clicking untrusted links and implement multi-factor authentication to reduce the impact of compromised credentials. Monitor logs for suspicious requests targeting the vulnerable parameters. If possible, isolate the affected system until a vendor patch or update is available. Engage with the vendor to obtain or request a security update. Consider deploying web application firewalls (WAF) with rules to detect and block common XSS attack patterns targeting this application. Regularly audit and test the application for similar input validation issues to prevent future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-07T11:44:02.730Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e5d047a677756fc9ae27f1

Added to database: 10/8/2025, 2:45:27 AM

Last enriched: 2/24/2026, 9:57:49 PM

Last updated: 3/21/2026, 12:26:49 PM

Views: 132

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses