Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12230: Cross Site Scripting in projectworlds Expense Management System

0
Medium
VulnerabilityCVE-2025-12230cvecve-2025-12230
Published: Mon Oct 27 2025 (10/27/2025, 06:02:06 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: Expense Management System

Description

A weakness has been identified in projectworlds Expense Management System 1.0. This impacts an unknown function of the file /public/admin/currencies/create of the component Currency Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 11/03/2025, 07:00:35 UTC

Technical Analysis

CVE-2025-12230 identifies a cross-site scripting (XSS) vulnerability in the projectworlds Expense Management System version 1.0. The flaw exists in the /public/admin/currencies/create endpoint within the Currency Page component. This vulnerability allows an attacker to inject malicious scripts remotely, which are then executed in the context of an authenticated administrative user. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and does not require authentication (AT:N), but user interaction (UI:P) is necessary to trigger the exploit. The vulnerability impacts the integrity and confidentiality of the system to a limited extent (VI:L, VC:N), without affecting availability. The CVSS 4.0 vector indicates no privileges required (PR:H) but user interaction is needed, suggesting that an attacker must trick an authenticated user into performing an action such as clicking a crafted link or submitting malicious input. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The vulnerability is confined to version 1.0 of the product, and no official patches or updates have been released at the time of publication. This XSS flaw could allow attackers to steal session cookies, perform actions on behalf of the user, or conduct phishing attacks within the administrative interface, potentially leading to unauthorized financial data manipulation or disclosure.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access or manipulation of sensitive financial data managed by the Expense Management System. Given the administrative nature of the affected component, successful exploitation could compromise the integrity of currency settings or financial records, potentially disrupting accounting processes or enabling fraudulent transactions. Confidentiality risks include session hijacking or theft of administrative credentials, which could cascade into broader system compromise. Although availability is not directly impacted, the indirect effects of data manipulation or loss of trust in financial data integrity could be significant. Organizations in finance, government, and enterprises relying on projectworlds Expense Management System are particularly at risk. The public availability of exploit code increases the urgency for mitigation, as attackers could leverage this vulnerability in targeted phishing campaigns or automated attacks against exposed administrative interfaces. The medium severity rating reflects the limited scope and requirement for user interaction but does not diminish the potential business impact in sensitive financial environments.

Mitigation Recommendations

To mitigate CVE-2025-12230, organizations should implement strict input validation and sanitization on all user-supplied data within the /public/admin/currencies/create endpoint to prevent script injection. Deploying a robust Content Security Policy (CSP) can help restrict the execution of unauthorized scripts. Access to the vulnerable administrative interface should be limited using network segmentation, VPNs, or IP whitelisting to reduce exposure. Multi-factor authentication (MFA) for administrative accounts can mitigate the risk of credential theft. Monitoring and alerting on unusual administrative activities can help detect exploitation attempts early. Since no official patch is available, organizations should consider virtual patching via web application firewalls (WAFs) configured to block known XSS attack patterns targeting this endpoint. User training to recognize phishing attempts and suspicious links is also critical, given the requirement for user interaction. Finally, organizations should engage with the vendor for updates and plan for timely patch deployment once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T17:00:35.913Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff0bad4c2556d99606b1d1

Added to database: 10/27/2025, 6:05:33 AM

Last enriched: 11/3/2025, 7:00:35 AM

Last updated: 12/9/2025, 6:35:40 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats