CVE-2025-13178: Basic Cross Site Scripting in Bdtask SalesERP
A flaw has been found in Bdtask/CodeCanyon SalesERP up to 20250728. This vulnerability affects unknown code of the file /edit_profile of the component User Profile Handler. This manipulation of the argument first_name/last_name causes basic cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13178 identifies a basic cross-site scripting (XSS) vulnerability in the Bdtask SalesERP software, version 20250728 and earlier. The vulnerability exists in the /edit_profile endpoint within the User Profile Handler component, where the first_name and last_name parameters are not properly sanitized or encoded before being reflected in the web application’s response. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim’s browser. The attack vector is remote and does not require prior authentication, although it requires user interaction, such as clicking a malicious link or visiting a compromised page. The vulnerability is classified as a reflected XSS, which can be leveraged to steal session cookies, perform actions on behalf of the user, or deliver malware payloads. The vendor was contacted early but did not respond or provide a patch, and a public exploit has been published, increasing the risk of exploitation. The CVSS v4.0 score is 5.1, reflecting medium severity due to the ease of exploitation but limited impact on system integrity or availability. The vulnerability affects organizations using the SalesERP platform, particularly those that allow users to update profile information via the vulnerable endpoint. Without mitigation, attackers can exploit this flaw to compromise user accounts or escalate attacks within the affected network.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data. Exploitation could lead to theft of session tokens, unauthorized actions performed in the context of legitimate users, and potential spread of malware through client-side scripting. Organizations relying on Bdtask SalesERP for customer relationship management, sales tracking, or internal ERP functions may experience data breaches or operational disruptions. The lack of vendor response and patch availability increases exposure time, making timely mitigation critical. Industries with high reliance on ERP systems, such as manufacturing, retail, and services, could face reputational damage and regulatory consequences under GDPR if personal data is compromised. The vulnerability’s remote exploitability and public exploit availability heighten the threat landscape, especially in environments with limited web security controls or user awareness.
Mitigation Recommendations
European organizations should implement specific mitigations beyond generic advice: 1) Apply strict input validation and output encoding on the first_name and last_name fields at the application level, ideally by customizing or patching the SalesERP code if possible. 2) Deploy a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the /edit_profile endpoint. 3) Enforce Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Conduct user awareness training to recognize phishing attempts and suspicious links that could trigger XSS attacks. 5) Monitor web server and application logs for unusual requests or error patterns related to profile editing. 6) Isolate the SalesERP application environment to limit lateral movement in case of compromise. 7) Engage with Bdtask or community forums to track any forthcoming patches or workarounds. 8) Consider temporary disabling or restricting access to the vulnerable endpoint if feasible until a fix is available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-13178: Basic Cross Site Scripting in Bdtask SalesERP
Description
A flaw has been found in Bdtask/CodeCanyon SalesERP up to 20250728. This vulnerability affects unknown code of the file /edit_profile of the component User Profile Handler. This manipulation of the argument first_name/last_name causes basic cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13178 identifies a basic cross-site scripting (XSS) vulnerability in the Bdtask SalesERP software, version 20250728 and earlier. The vulnerability exists in the /edit_profile endpoint within the User Profile Handler component, where the first_name and last_name parameters are not properly sanitized or encoded before being reflected in the web application’s response. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim’s browser. The attack vector is remote and does not require prior authentication, although it requires user interaction, such as clicking a malicious link or visiting a compromised page. The vulnerability is classified as a reflected XSS, which can be leveraged to steal session cookies, perform actions on behalf of the user, or deliver malware payloads. The vendor was contacted early but did not respond or provide a patch, and a public exploit has been published, increasing the risk of exploitation. The CVSS v4.0 score is 5.1, reflecting medium severity due to the ease of exploitation but limited impact on system integrity or availability. The vulnerability affects organizations using the SalesERP platform, particularly those that allow users to update profile information via the vulnerable endpoint. Without mitigation, attackers can exploit this flaw to compromise user accounts or escalate attacks within the affected network.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data. Exploitation could lead to theft of session tokens, unauthorized actions performed in the context of legitimate users, and potential spread of malware through client-side scripting. Organizations relying on Bdtask SalesERP for customer relationship management, sales tracking, or internal ERP functions may experience data breaches or operational disruptions. The lack of vendor response and patch availability increases exposure time, making timely mitigation critical. Industries with high reliance on ERP systems, such as manufacturing, retail, and services, could face reputational damage and regulatory consequences under GDPR if personal data is compromised. The vulnerability’s remote exploitability and public exploit availability heighten the threat landscape, especially in environments with limited web security controls or user awareness.
Mitigation Recommendations
European organizations should implement specific mitigations beyond generic advice: 1) Apply strict input validation and output encoding on the first_name and last_name fields at the application level, ideally by customizing or patching the SalesERP code if possible. 2) Deploy a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the /edit_profile endpoint. 3) Enforce Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Conduct user awareness training to recognize phishing attempts and suspicious links that could trigger XSS attacks. 5) Monitor web server and application logs for unusual requests or error patterns related to profile editing. 6) Isolate the SalesERP application environment to limit lateral movement in case of compromise. 7) Engage with Bdtask or community forums to track any forthcoming patches or workarounds. 8) Consider temporary disabling or restricting access to the vulnerable endpoint if feasible until a fix is available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T11:01:40.704Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69177ea4901ba91f3226fd55
Added to database: 11/14/2025, 7:10:28 PM
Last enriched: 11/14/2025, 7:17:47 PM
Last updated: 11/15/2025, 3:49:15 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12182: CWE-284 Improper Access Control in qodeinteractive Qi Blocks
MediumIdentity Governance and Administration, App Proliferation, and the App Integration Chasm
Medium150,000 Packages Flood NPM Registry in Token Farming Campaign
MediumCVE-2023-6596: Uncontrolled Resource Consumption
HighCVE-2025-9317: CWE-327 in AVEVA Edge
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.