Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12332: Cross Site Scripting in SourceCodester Student Grades Management System

0
Medium
VulnerabilityCVE-2025-12332cvecve-2025-12332
Published: Mon Oct 27 2025 (10/27/2025, 23:22:09 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Student Grades Management System

Description

A flaw has been found in SourceCodester Student Grades Management System 1.0. This affects the function delete_user of the file /admin.php. Executing manipulation can lead to cross site scripting. The attack may be performed from remote. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 10/27/2025, 23:52:48 UTC

Technical Analysis

CVE-2025-12332 identifies a cross-site scripting vulnerability in the SourceCodester Student Grades Management System version 1.0, specifically within the delete_user function located in the /admin.php file. This vulnerability arises due to insufficient input validation or sanitization of user-supplied data, allowing an attacker to inject malicious scripts that execute in the context of an authenticated administrator's browser session. The attack vector is remote, requiring the attacker to have high privileges (PR:H) but no authentication bypass is needed, and user interaction is necessary (UI:P), such as tricking an admin into clicking a crafted link or visiting a malicious page. The CVSS 4.0 base score of 4.8 reflects a medium severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required for the attack initiation (AT:N), but high privileges needed overall (PR:H). The vulnerability impacts confidentiality and integrity to a limited degree (VI:L), with no impact on availability. While no known exploits are currently active in the wild, the public disclosure and availability of proof-of-concept code increase the risk of exploitation. The vulnerability could enable attackers to steal session cookies, perform unauthorized actions, or conduct phishing attacks targeting administrative users. The lack of patches at the time of disclosure necessitates immediate mitigation efforts by affected organizations.

Potential Impact

For European organizations, particularly educational institutions and administrative bodies using the SourceCodester Student Grades Management System, this vulnerability poses a risk to the confidentiality and integrity of sensitive student data and administrative credentials. Successful exploitation could lead to session hijacking, unauthorized access to administrative functions, and potential manipulation or theft of student grades and personal information. Although the vulnerability does not directly affect system availability, the indirect consequences of compromised administrative accounts could disrupt operations and erode trust. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, especially in environments where administrators may be targeted via social engineering. The exposure of sensitive educational data could also have regulatory implications under GDPR, increasing legal and financial risks for affected organizations.

Mitigation Recommendations

1. Apply official patches or updates from SourceCodester as soon as they become available to address the vulnerability directly. 2. In the absence of patches, implement strict input validation and output encoding on all parameters handled by the delete_user function, ensuring that any user-supplied data is sanitized to prevent script injection. 3. Restrict administrative access to the Student Grades Management System to trusted networks and users, employing network segmentation and VPNs where possible. 4. Enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 5. Educate administrators about phishing and social engineering tactics to reduce the likelihood of user interaction exploitation. 6. Monitor logs and network traffic for unusual activity related to the /admin.php endpoint, including unexpected parameter values or repeated failed attempts. 7. Consider implementing Content Security Policy (CSP) headers to limit the impact of potential XSS attacks. 8. Regularly review and audit web application security configurations and conduct penetration testing to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T12:22:18.881Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6900024dba6dffc5e2193200

Added to database: 10/27/2025, 11:37:49 PM

Last enriched: 10/27/2025, 11:52:48 PM

Last updated: 10/28/2025, 6:41:42 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats