CVE-2025-11512: Cross Site Scripting in code-projects Voting System
A vulnerability was found in code-projects Voting System 1.0. Affected by this issue is some unknown functionality of the file /admin/voters_add.php. The manipulation of the argument Firstname/Lastname/Platform results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-11512 is a Cross Site Scripting (XSS) vulnerability identified in the code-projects Voting System version 1.0. The flaw exists in the /admin/voters_add.php file, where the parameters Firstname, Lastname, and Platform are not properly sanitized or encoded before being processed or rendered. This allows an attacker to inject malicious JavaScript code remotely without requiring authentication. The vulnerability is triggered when an administrator or authorized user accesses manipulated input containing the malicious payload, which executes in their browser context. The CVSS 4.0 vector indicates the attack is network exploitable (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:P), and has limited impact on integrity (VI:L) but no impact on confidentiality or availability. Although no active exploits are reported in the wild, the public disclosure of exploit code increases the risk of exploitation. The vulnerability could be leveraged to steal session cookies, perform unauthorized actions, or redirect users to malicious sites, undermining the trustworthiness of the voting system. The lack of patches or official fixes necessitates immediate mitigation through input validation, output encoding, and access controls. This vulnerability highlights the importance of secure coding practices in election-related software, where integrity and trust are paramount.
Potential Impact
For European organizations, especially those involved in electoral processes, public polling, or decision-making platforms, this XSS vulnerability poses a significant risk to the integrity and confidentiality of voting data. Exploitation could allow attackers to hijack administrator sessions, manipulate voting records, or deface administrative interfaces, leading to loss of trust and potential legal consequences. The vulnerability could also be used as a foothold for further attacks within the network if administrative credentials are compromised. Given the public availability of exploit code, there is an increased risk of opportunistic attacks targeting less-secure installations. The impact extends beyond technical compromise to reputational damage and erosion of public confidence in democratic processes. Organizations may face regulatory scrutiny under GDPR if personal data is exposed or manipulated. The medium severity suggests a moderate but actionable risk that should be addressed promptly to avoid escalation.
Mitigation Recommendations
1. Implement strict input validation and sanitization on all user-supplied data, particularly the Firstname, Lastname, and Platform parameters in /admin/voters_add.php. Use allowlists and reject any unexpected characters or scripts. 2. Apply proper output encoding (e.g., HTML entity encoding) before rendering user inputs in the admin interface to prevent script execution. 3. Restrict access to the administrative interface using network-level controls such as VPNs, IP whitelisting, or multi-factor authentication to reduce exposure. 4. Monitor web server and application logs for suspicious requests containing script tags or unusual payloads targeting the vulnerable parameters. 5. Educate administrators about the risk of clicking on untrusted links or inputting unverified data. 6. If possible, isolate the voting system environment to limit lateral movement in case of compromise. 7. Engage with the vendor or community to obtain or develop patches addressing this vulnerability. 8. Conduct regular security assessments and code reviews focusing on input handling and output encoding practices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-11512: Cross Site Scripting in code-projects Voting System
Description
A vulnerability was found in code-projects Voting System 1.0. Affected by this issue is some unknown functionality of the file /admin/voters_add.php. The manipulation of the argument Firstname/Lastname/Platform results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11512 is a Cross Site Scripting (XSS) vulnerability identified in the code-projects Voting System version 1.0. The flaw exists in the /admin/voters_add.php file, where the parameters Firstname, Lastname, and Platform are not properly sanitized or encoded before being processed or rendered. This allows an attacker to inject malicious JavaScript code remotely without requiring authentication. The vulnerability is triggered when an administrator or authorized user accesses manipulated input containing the malicious payload, which executes in their browser context. The CVSS 4.0 vector indicates the attack is network exploitable (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:P), and has limited impact on integrity (VI:L) but no impact on confidentiality or availability. Although no active exploits are reported in the wild, the public disclosure of exploit code increases the risk of exploitation. The vulnerability could be leveraged to steal session cookies, perform unauthorized actions, or redirect users to malicious sites, undermining the trustworthiness of the voting system. The lack of patches or official fixes necessitates immediate mitigation through input validation, output encoding, and access controls. This vulnerability highlights the importance of secure coding practices in election-related software, where integrity and trust are paramount.
Potential Impact
For European organizations, especially those involved in electoral processes, public polling, or decision-making platforms, this XSS vulnerability poses a significant risk to the integrity and confidentiality of voting data. Exploitation could allow attackers to hijack administrator sessions, manipulate voting records, or deface administrative interfaces, leading to loss of trust and potential legal consequences. The vulnerability could also be used as a foothold for further attacks within the network if administrative credentials are compromised. Given the public availability of exploit code, there is an increased risk of opportunistic attacks targeting less-secure installations. The impact extends beyond technical compromise to reputational damage and erosion of public confidence in democratic processes. Organizations may face regulatory scrutiny under GDPR if personal data is exposed or manipulated. The medium severity suggests a moderate but actionable risk that should be addressed promptly to avoid escalation.
Mitigation Recommendations
1. Implement strict input validation and sanitization on all user-supplied data, particularly the Firstname, Lastname, and Platform parameters in /admin/voters_add.php. Use allowlists and reject any unexpected characters or scripts. 2. Apply proper output encoding (e.g., HTML entity encoding) before rendering user inputs in the admin interface to prevent script execution. 3. Restrict access to the administrative interface using network-level controls such as VPNs, IP whitelisting, or multi-factor authentication to reduce exposure. 4. Monitor web server and application logs for suspicious requests containing script tags or unusual payloads targeting the vulnerable parameters. 5. Educate administrators about the risk of clicking on untrusted links or inputting unverified data. 6. If possible, isolate the voting system environment to limit lateral movement in case of compromise. 7. Engage with the vendor or community to obtain or develop patches addressing this vulnerability. 8. Conduct regular security assessments and code reviews focusing on input handling and output encoding practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-08T15:08:56.928Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e6f7045269778ce9b0c3d4
Added to database: 10/8/2025, 11:43:00 PM
Last enriched: 10/8/2025, 11:48:09 PM
Last updated: 10/9/2025, 12:45:59 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11516: SQL Injection in code-projects Online Complaint Site
MediumCVE-2025-11515: SQL Injection in code-projects Online Complaint Site
MediumCVE-2025-11514: SQL Injection in code-projects Online Complaint Site
MediumCVE-2025-11513: SQL Injection in code-projects E-Commerce Website
MediumCVE-2025-61913: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in FlowiseAI Flowise
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.