CVE-2025-12230: Cross Site Scripting in projectworlds Expense Management System
A weakness has been identified in projectworlds Expense Management System 1.0. This impacts an unknown function of the file /public/admin/currencies/create of the component Currency Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-12230 identifies a cross-site scripting (XSS) vulnerability in the projectworlds Expense Management System version 1.0. The flaw exists in the /public/admin/currencies/create endpoint within the Currency Page component. This vulnerability allows an attacker to inject malicious scripts remotely, which are then executed in the context of an authenticated administrative user. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and does not require authentication (AT:N), but user interaction (UI:P) is necessary to trigger the exploit. The vulnerability impacts the integrity and confidentiality of the system to a limited extent (VI:L, VC:N), without affecting availability. The CVSS 4.0 vector indicates no privileges required (PR:H) but user interaction is needed, suggesting that an attacker must trick an authenticated user into performing an action such as clicking a crafted link or submitting malicious input. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The vulnerability is confined to version 1.0 of the product, and no official patches or updates have been released at the time of publication. This XSS flaw could allow attackers to steal session cookies, perform actions on behalf of the user, or conduct phishing attacks within the administrative interface, potentially leading to unauthorized financial data manipulation or disclosure.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access or manipulation of sensitive financial data managed by the Expense Management System. Given the administrative nature of the affected component, successful exploitation could compromise the integrity of currency settings or financial records, potentially disrupting accounting processes or enabling fraudulent transactions. Confidentiality risks include session hijacking or theft of administrative credentials, which could cascade into broader system compromise. Although availability is not directly impacted, the indirect effects of data manipulation or loss of trust in financial data integrity could be significant. Organizations in finance, government, and enterprises relying on projectworlds Expense Management System are particularly at risk. The public availability of exploit code increases the urgency for mitigation, as attackers could leverage this vulnerability in targeted phishing campaigns or automated attacks against exposed administrative interfaces. The medium severity rating reflects the limited scope and requirement for user interaction but does not diminish the potential business impact in sensitive financial environments.
Mitigation Recommendations
To mitigate CVE-2025-12230, organizations should implement strict input validation and sanitization on all user-supplied data within the /public/admin/currencies/create endpoint to prevent script injection. Deploying a robust Content Security Policy (CSP) can help restrict the execution of unauthorized scripts. Access to the vulnerable administrative interface should be limited using network segmentation, VPNs, or IP whitelisting to reduce exposure. Multi-factor authentication (MFA) for administrative accounts can mitigate the risk of credential theft. Monitoring and alerting on unusual administrative activities can help detect exploitation attempts early. Since no official patch is available, organizations should consider virtual patching via web application firewalls (WAFs) configured to block known XSS attack patterns targeting this endpoint. User training to recognize phishing attempts and suspicious links is also critical, given the requirement for user interaction. Finally, organizations should engage with the vendor for updates and plan for timely patch deployment once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-12230: Cross Site Scripting in projectworlds Expense Management System
Description
A weakness has been identified in projectworlds Expense Management System 1.0. This impacts an unknown function of the file /public/admin/currencies/create of the component Currency Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-12230 identifies a cross-site scripting (XSS) vulnerability in the projectworlds Expense Management System version 1.0. The flaw exists in the /public/admin/currencies/create endpoint within the Currency Page component. This vulnerability allows an attacker to inject malicious scripts remotely, which are then executed in the context of an authenticated administrative user. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and does not require authentication (AT:N), but user interaction (UI:P) is necessary to trigger the exploit. The vulnerability impacts the integrity and confidentiality of the system to a limited extent (VI:L, VC:N), without affecting availability. The CVSS 4.0 vector indicates no privileges required (PR:H) but user interaction is needed, suggesting that an attacker must trick an authenticated user into performing an action such as clicking a crafted link or submitting malicious input. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The vulnerability is confined to version 1.0 of the product, and no official patches or updates have been released at the time of publication. This XSS flaw could allow attackers to steal session cookies, perform actions on behalf of the user, or conduct phishing attacks within the administrative interface, potentially leading to unauthorized financial data manipulation or disclosure.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access or manipulation of sensitive financial data managed by the Expense Management System. Given the administrative nature of the affected component, successful exploitation could compromise the integrity of currency settings or financial records, potentially disrupting accounting processes or enabling fraudulent transactions. Confidentiality risks include session hijacking or theft of administrative credentials, which could cascade into broader system compromise. Although availability is not directly impacted, the indirect effects of data manipulation or loss of trust in financial data integrity could be significant. Organizations in finance, government, and enterprises relying on projectworlds Expense Management System are particularly at risk. The public availability of exploit code increases the urgency for mitigation, as attackers could leverage this vulnerability in targeted phishing campaigns or automated attacks against exposed administrative interfaces. The medium severity rating reflects the limited scope and requirement for user interaction but does not diminish the potential business impact in sensitive financial environments.
Mitigation Recommendations
To mitigate CVE-2025-12230, organizations should implement strict input validation and sanitization on all user-supplied data within the /public/admin/currencies/create endpoint to prevent script injection. Deploying a robust Content Security Policy (CSP) can help restrict the execution of unauthorized scripts. Access to the vulnerable administrative interface should be limited using network segmentation, VPNs, or IP whitelisting to reduce exposure. Multi-factor authentication (MFA) for administrative accounts can mitigate the risk of credential theft. Monitoring and alerting on unusual administrative activities can help detect exploitation attempts early. Since no official patch is available, organizations should consider virtual patching via web application firewalls (WAFs) configured to block known XSS attack patterns targeting this endpoint. User training to recognize phishing attempts and suspicious links is also critical, given the requirement for user interaction. Finally, organizations should engage with the vendor for updates and plan for timely patch deployment once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-25T17:00:35.913Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff0bad4c2556d99606b1d1
Added to database: 10/27/2025, 6:05:33 AM
Last enriched: 11/3/2025, 7:00:35 AM
Last updated: 12/9/2025, 6:35:40 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13071: CWE-79 Cross-Site Scripting (XSS) in Custom Admin Menu
HighCVE-2025-13070: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in CSV to SortTable
UnknownCVE-2025-13031: CWE-79 Cross-Site Scripting (XSS) in WPeMatico RSS Feed Fetcher
UnknownCVE-2025-14284: Cross-site Scripting (XSS) in @tiptap/extension-link
MediumCVE-2025-13604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cleantalk Login Security, FireWall, Malware removal by CleanTalk
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.