Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12332: Cross Site Scripting in SourceCodester Student Grades Management System

0
Medium
VulnerabilityCVE-2025-12332cvecve-2025-12332
Published: Mon Oct 27 2025 (10/27/2025, 23:22:09 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Student Grades Management System

Description

A flaw has been found in SourceCodester Student Grades Management System 1.0. This affects the function delete_user of the file /admin.php. Executing manipulation can lead to cross site scripting. The attack may be performed from remote. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 11/04/2025, 03:21:38 UTC

Technical Analysis

CVE-2025-12332 identifies a cross-site scripting vulnerability in the SourceCodester Student Grades Management System version 1.0. The vulnerability resides in the delete_user function of the /admin.php file, where insufficient input sanitization allows malicious input to be reflected back in the web interface. This flaw enables an attacker to inject arbitrary JavaScript code that executes in the context of an authenticated administrator’s browser session. The attack vector is remote, but requires the attacker to have high privileges (likely an administrative or similarly privileged user) and some user interaction to trigger the malicious script. The CVSS 4.0 score of 4.8 reflects a medium severity, considering the ease of exploitation (low complexity), the need for authentication, and the limited impact on confidentiality and availability but potential impact on integrity and user session security. While no active exploits have been observed in the wild, the existence of published proof-of-concept code raises the likelihood of exploitation attempts. The vulnerability could be leveraged to steal session cookies, perform unauthorized actions on behalf of the administrator, or conduct phishing attacks within the trusted environment of the grades management system. Given the nature of the product—used primarily by educational institutions to manage sensitive student data—this vulnerability poses a risk to data integrity and privacy. The absence of official patches at the time of publication necessitates immediate mitigation steps by administrators.

Potential Impact

For European organizations, particularly educational institutions using the SourceCodester Student Grades Management System, this vulnerability could lead to unauthorized actions performed under administrator privileges, compromising the integrity of student records and potentially exposing sensitive personal data. Attackers exploiting this XSS flaw could hijack administrator sessions, inject malicious content, or manipulate grade data, undermining trust in the system. The impact extends beyond data integrity to reputational damage and potential regulatory non-compliance under GDPR if personal data is exposed or altered. Since the vulnerability requires high privileges and user interaction, the risk is somewhat contained but remains significant in environments where administrative credentials are shared or weakly protected. The medium severity rating suggests that while the vulnerability is not critical, it still demands prompt attention to prevent escalation or lateral movement within the network. The educational sector in Europe is increasingly targeted by cyber threats, making timely mitigation essential to protect student data and institutional operations.

Mitigation Recommendations

1. Apply official patches or updates from SourceCodester as soon as they become available to address the vulnerability directly. 2. Until patches are released, implement strict input validation and output encoding on all parameters handled by the delete_user function to prevent injection of malicious scripts. 3. Restrict administrative access to the grades management system using network segmentation, VPNs, or IP whitelisting to reduce exposure to remote attackers. 4. Enforce strong authentication mechanisms for administrative accounts, including multi-factor authentication (MFA), to limit the risk of compromised credentials. 5. Conduct regular security awareness training for administrators to recognize and avoid phishing or social engineering attempts that could trigger the XSS attack. 6. Monitor web server and application logs for unusual activity or repeated attempts to exploit the delete_user function. 7. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting the execution of unauthorized scripts. 8. Review and harden session management practices to prevent session fixation or hijacking in case of successful XSS exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T12:22:18.881Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6900024dba6dffc5e2193200

Added to database: 10/27/2025, 11:37:49 PM

Last enriched: 11/4/2025, 3:21:38 AM

Last updated: 12/12/2025, 1:44:54 PM

Views: 140

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats