CVE-2025-12332: Cross Site Scripting in SourceCodester Student Grades Management System
A flaw has been found in SourceCodester Student Grades Management System 1.0. This affects the function delete_user of the file /admin.php. Executing manipulation can lead to cross site scripting. The attack may be performed from remote. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-12332 identifies a cross-site scripting vulnerability in the SourceCodester Student Grades Management System version 1.0, specifically within the delete_user function located in the /admin.php file. This vulnerability arises due to insufficient input validation or sanitization of user-supplied data, allowing an attacker to inject malicious scripts that execute in the context of an authenticated administrator's browser session. The attack vector is remote, requiring the attacker to have high privileges (PR:H) but no authentication bypass is needed, and user interaction is necessary (UI:P), such as tricking an admin into clicking a crafted link or visiting a malicious page. The CVSS 4.0 base score of 4.8 reflects a medium severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required for the attack initiation (AT:N), but high privileges needed overall (PR:H). The vulnerability impacts confidentiality and integrity to a limited degree (VI:L), with no impact on availability. While no known exploits are currently active in the wild, the public disclosure and availability of proof-of-concept code increase the risk of exploitation. The vulnerability could enable attackers to steal session cookies, perform unauthorized actions, or conduct phishing attacks targeting administrative users. The lack of patches at the time of disclosure necessitates immediate mitigation efforts by affected organizations.
Potential Impact
For European organizations, particularly educational institutions and administrative bodies using the SourceCodester Student Grades Management System, this vulnerability poses a risk to the confidentiality and integrity of sensitive student data and administrative credentials. Successful exploitation could lead to session hijacking, unauthorized access to administrative functions, and potential manipulation or theft of student grades and personal information. Although the vulnerability does not directly affect system availability, the indirect consequences of compromised administrative accounts could disrupt operations and erode trust. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, especially in environments where administrators may be targeted via social engineering. The exposure of sensitive educational data could also have regulatory implications under GDPR, increasing legal and financial risks for affected organizations.
Mitigation Recommendations
1. Apply official patches or updates from SourceCodester as soon as they become available to address the vulnerability directly. 2. In the absence of patches, implement strict input validation and output encoding on all parameters handled by the delete_user function, ensuring that any user-supplied data is sanitized to prevent script injection. 3. Restrict administrative access to the Student Grades Management System to trusted networks and users, employing network segmentation and VPNs where possible. 4. Enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 5. Educate administrators about phishing and social engineering tactics to reduce the likelihood of user interaction exploitation. 6. Monitor logs and network traffic for unusual activity related to the /admin.php endpoint, including unexpected parameter values or repeated failed attempts. 7. Consider implementing Content Security Policy (CSP) headers to limit the impact of potential XSS attacks. 8. Regularly review and audit web application security configurations and conduct penetration testing to identify and remediate similar vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-12332: Cross Site Scripting in SourceCodester Student Grades Management System
Description
A flaw has been found in SourceCodester Student Grades Management System 1.0. This affects the function delete_user of the file /admin.php. Executing manipulation can lead to cross site scripting. The attack may be performed from remote. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-12332 identifies a cross-site scripting vulnerability in the SourceCodester Student Grades Management System version 1.0, specifically within the delete_user function located in the /admin.php file. This vulnerability arises due to insufficient input validation or sanitization of user-supplied data, allowing an attacker to inject malicious scripts that execute in the context of an authenticated administrator's browser session. The attack vector is remote, requiring the attacker to have high privileges (PR:H) but no authentication bypass is needed, and user interaction is necessary (UI:P), such as tricking an admin into clicking a crafted link or visiting a malicious page. The CVSS 4.0 base score of 4.8 reflects a medium severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required for the attack initiation (AT:N), but high privileges needed overall (PR:H). The vulnerability impacts confidentiality and integrity to a limited degree (VI:L), with no impact on availability. While no known exploits are currently active in the wild, the public disclosure and availability of proof-of-concept code increase the risk of exploitation. The vulnerability could enable attackers to steal session cookies, perform unauthorized actions, or conduct phishing attacks targeting administrative users. The lack of patches at the time of disclosure necessitates immediate mitigation efforts by affected organizations.
Potential Impact
For European organizations, particularly educational institutions and administrative bodies using the SourceCodester Student Grades Management System, this vulnerability poses a risk to the confidentiality and integrity of sensitive student data and administrative credentials. Successful exploitation could lead to session hijacking, unauthorized access to administrative functions, and potential manipulation or theft of student grades and personal information. Although the vulnerability does not directly affect system availability, the indirect consequences of compromised administrative accounts could disrupt operations and erode trust. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, especially in environments where administrators may be targeted via social engineering. The exposure of sensitive educational data could also have regulatory implications under GDPR, increasing legal and financial risks for affected organizations.
Mitigation Recommendations
1. Apply official patches or updates from SourceCodester as soon as they become available to address the vulnerability directly. 2. In the absence of patches, implement strict input validation and output encoding on all parameters handled by the delete_user function, ensuring that any user-supplied data is sanitized to prevent script injection. 3. Restrict administrative access to the Student Grades Management System to trusted networks and users, employing network segmentation and VPNs where possible. 4. Enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 5. Educate administrators about phishing and social engineering tactics to reduce the likelihood of user interaction exploitation. 6. Monitor logs and network traffic for unusual activity related to the /admin.php endpoint, including unexpected parameter values or repeated failed attempts. 7. Consider implementing Content Security Policy (CSP) headers to limit the impact of potential XSS attacks. 8. Regularly review and audit web application security configurations and conduct penetration testing to identify and remediate similar vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-27T12:22:18.881Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6900024dba6dffc5e2193200
Added to database: 10/27/2025, 11:37:49 PM
Last enriched: 10/27/2025, 11:52:48 PM
Last updated: 10/28/2025, 6:41:42 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12378: Unrestricted Upload in code-projects Simple Food Ordering System
MediumCVE-2025-11735: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in realmag777 HUSKY – Products Filter Professional for WooCommerce
HighCVE-2025-10145: CWE-918 Server-Side Request Forgery (SSRF) in themeisle Auto Featured Image (Auto Post Thumbnail)
HighCVE-2025-62777: Use of hard-coded credentials in PLANEX COMMUNICATIONS INC. MZK-DP300N
HighCVE-2025-10939: Uncontrolled Search Path Element in Red Hat Red Hat Build of Keycloak
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.