Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13178: Basic Cross Site Scripting in Bdtask SalesERP

0
Medium
VulnerabilityCVE-2025-13178cvecve-2025-13178
Published: Fri Nov 14 2025 (11/14/2025, 19:02:10 UTC)
Source: CVE Database V5
Vendor/Project: Bdtask
Product: SalesERP

Description

A flaw has been found in Bdtask/CodeCanyon SalesERP up to 20250728. This vulnerability affects unknown code of the file /edit_profile of the component User Profile Handler. This manipulation of the argument first_name/last_name causes basic cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/14/2025, 19:17:47 UTC

Technical Analysis

CVE-2025-13178 identifies a basic cross-site scripting (XSS) vulnerability in the Bdtask SalesERP software, version 20250728 and earlier. The vulnerability exists in the /edit_profile endpoint within the User Profile Handler component, where the first_name and last_name parameters are not properly sanitized or encoded before being reflected in the web application’s response. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim’s browser. The attack vector is remote and does not require prior authentication, although it requires user interaction, such as clicking a malicious link or visiting a compromised page. The vulnerability is classified as a reflected XSS, which can be leveraged to steal session cookies, perform actions on behalf of the user, or deliver malware payloads. The vendor was contacted early but did not respond or provide a patch, and a public exploit has been published, increasing the risk of exploitation. The CVSS v4.0 score is 5.1, reflecting medium severity due to the ease of exploitation but limited impact on system integrity or availability. The vulnerability affects organizations using the SalesERP platform, particularly those that allow users to update profile information via the vulnerable endpoint. Without mitigation, attackers can exploit this flaw to compromise user accounts or escalate attacks within the affected network.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data. Exploitation could lead to theft of session tokens, unauthorized actions performed in the context of legitimate users, and potential spread of malware through client-side scripting. Organizations relying on Bdtask SalesERP for customer relationship management, sales tracking, or internal ERP functions may experience data breaches or operational disruptions. The lack of vendor response and patch availability increases exposure time, making timely mitigation critical. Industries with high reliance on ERP systems, such as manufacturing, retail, and services, could face reputational damage and regulatory consequences under GDPR if personal data is compromised. The vulnerability’s remote exploitability and public exploit availability heighten the threat landscape, especially in environments with limited web security controls or user awareness.

Mitigation Recommendations

European organizations should implement specific mitigations beyond generic advice: 1) Apply strict input validation and output encoding on the first_name and last_name fields at the application level, ideally by customizing or patching the SalesERP code if possible. 2) Deploy a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the /edit_profile endpoint. 3) Enforce Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Conduct user awareness training to recognize phishing attempts and suspicious links that could trigger XSS attacks. 5) Monitor web server and application logs for unusual requests or error patterns related to profile editing. 6) Isolate the SalesERP application environment to limit lateral movement in case of compromise. 7) Engage with Bdtask or community forums to track any forthcoming patches or workarounds. 8) Consider temporary disabling or restricting access to the vulnerable endpoint if feasible until a fix is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T11:01:40.704Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69177ea4901ba91f3226fd55

Added to database: 11/14/2025, 7:10:28 PM

Last enriched: 11/14/2025, 7:17:47 PM

Last updated: 11/15/2025, 3:49:15 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats