CVE-2025-12230: Cross Site Scripting in projectworlds Expense Management System
A weakness has been identified in projectworlds Expense Management System 1.0. This impacts an unknown function of the file /public/admin/currencies/create of the component Currency Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-12230 affects projectworlds Expense Management System version 1.0, specifically within the Currency Page component located at /public/admin/currencies/create. The issue is a cross-site scripting (XSS) vulnerability, which arises due to improper sanitization or encoding of user-supplied input before rendering it in the web interface. This allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser. The attack can be initiated remotely without authentication, but requires user interaction, such as clicking a crafted link or visiting a malicious page that triggers the payload. The CVSS 4.8 score reflects a medium severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges but the vector says no authentication needed, so possibly a discrepancy), and user interaction required (UI:P). The impact primarily affects integrity due to potential unauthorized actions performed via the injected script, with limited impact on confidentiality and no impact on availability. The exploit code has been publicly disclosed, increasing the likelihood of exploitation attempts. No patches have been linked yet, indicating that organizations must implement interim mitigations. The vulnerability is confined to version 1.0 of the product, which may limit the affected population but still poses a risk to users of this specific version.
Potential Impact
For European organizations using projectworlds Expense Management System 1.0, this XSS vulnerability can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users, especially administrators managing currency settings. Financial data integrity could be compromised, potentially leading to incorrect financial reporting or manipulation. While confidentiality and availability impacts are limited, the integrity breach could have regulatory and compliance consequences, particularly under GDPR where data integrity and protection are critical. The public availability of exploit code increases the risk of opportunistic attacks. Organizations in finance, accounting, and public sectors using this system are at heightened risk. The attack requires user interaction, so social engineering or phishing campaigns could be used to exploit the vulnerability. This could also serve as a pivot point for further attacks within the network if administrative privileges are compromised.
Mitigation Recommendations
1. Monitor projectworlds vendor communications for official patches addressing CVE-2025-12230 and apply them promptly once released. 2. Implement strict input validation and output encoding on the /public/admin/currencies/create page to sanitize all user inputs, preventing malicious script injection. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 4. Educate administrators and users about the risks of clicking unknown or suspicious links to reduce the likelihood of successful social engineering. 5. Use web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable endpoint. 6. Conduct regular security assessments and penetration testing focusing on web application vulnerabilities, especially in administrative interfaces. 7. Restrict access to the administrative interface by IP whitelisting or VPN to reduce exposure. 8. Monitor logs for unusual activity related to the currencies create page to detect exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-12230: Cross Site Scripting in projectworlds Expense Management System
Description
A weakness has been identified in projectworlds Expense Management System 1.0. This impacts an unknown function of the file /public/admin/currencies/create of the component Currency Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-12230 affects projectworlds Expense Management System version 1.0, specifically within the Currency Page component located at /public/admin/currencies/create. The issue is a cross-site scripting (XSS) vulnerability, which arises due to improper sanitization or encoding of user-supplied input before rendering it in the web interface. This allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser. The attack can be initiated remotely without authentication, but requires user interaction, such as clicking a crafted link or visiting a malicious page that triggers the payload. The CVSS 4.8 score reflects a medium severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges but the vector says no authentication needed, so possibly a discrepancy), and user interaction required (UI:P). The impact primarily affects integrity due to potential unauthorized actions performed via the injected script, with limited impact on confidentiality and no impact on availability. The exploit code has been publicly disclosed, increasing the likelihood of exploitation attempts. No patches have been linked yet, indicating that organizations must implement interim mitigations. The vulnerability is confined to version 1.0 of the product, which may limit the affected population but still poses a risk to users of this specific version.
Potential Impact
For European organizations using projectworlds Expense Management System 1.0, this XSS vulnerability can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users, especially administrators managing currency settings. Financial data integrity could be compromised, potentially leading to incorrect financial reporting or manipulation. While confidentiality and availability impacts are limited, the integrity breach could have regulatory and compliance consequences, particularly under GDPR where data integrity and protection are critical. The public availability of exploit code increases the risk of opportunistic attacks. Organizations in finance, accounting, and public sectors using this system are at heightened risk. The attack requires user interaction, so social engineering or phishing campaigns could be used to exploit the vulnerability. This could also serve as a pivot point for further attacks within the network if administrative privileges are compromised.
Mitigation Recommendations
1. Monitor projectworlds vendor communications for official patches addressing CVE-2025-12230 and apply them promptly once released. 2. Implement strict input validation and output encoding on the /public/admin/currencies/create page to sanitize all user inputs, preventing malicious script injection. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 4. Educate administrators and users about the risks of clicking unknown or suspicious links to reduce the likelihood of successful social engineering. 5. Use web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable endpoint. 6. Conduct regular security assessments and penetration testing focusing on web application vulnerabilities, especially in administrative interfaces. 7. Restrict access to the administrative interface by IP whitelisting or VPN to reduce exposure. 8. Monitor logs for unusual activity related to the currencies create page to detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-25T17:00:35.913Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff0bad4c2556d99606b1d1
Added to database: 10/27/2025, 6:05:33 AM
Last enriched: 10/27/2025, 6:20:46 AM
Last updated: 10/27/2025, 7:11:15 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12240: Buffer Overflow in TOTOLINK A3300R
HighCVE-2025-12239: Buffer Overflow in TOTOLINK A3300R
HighCVE-2025-12238: SQL Injection in code-projects Automated Voting System
MediumCVE-2025-12055: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MPDV Mikrolab GmbH MIP 2
HighCVE-2025-12231: Cross Site Scripting in projectworlds Expense Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.