CVE-2025-13244: Cross Site Scripting in code-projects Student Information System
A vulnerability was determined in code-projects Student Information System 2.0. The affected element is an unknown function of the file /register.php. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-13244 is a Cross Site Scripting (XSS) vulnerability identified in the code-projects Student Information System version 2.0. The vulnerability resides in an unspecified function within the /register.php file, which processes user input in a manner that allows malicious scripts to be injected and executed in the context of the victim's browser. This flaw can be exploited remotely without authentication, but requires user interaction, such as clicking a crafted link or submitting a malicious form. The vulnerability does not compromise confidentiality or availability directly but can affect integrity by enabling attackers to execute arbitrary scripts, potentially leading to session hijacking, phishing attacks, or unauthorized actions performed on behalf of the user. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no active exploitation has been reported yet. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and limited impact on integrity with no impact on confidentiality or availability. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for interim mitigations. The Student Information System is typically deployed in educational environments, making students, faculty, and administrative users potential targets. The vulnerability's exploitation could undermine trust in the system and lead to data manipulation or social engineering attacks.
Potential Impact
For European organizations, particularly educational institutions using the code-projects Student Information System 2.0, this vulnerability poses a risk of client-side attacks that can compromise user sessions and lead to phishing or social engineering campaigns. While it does not directly expose sensitive data or disrupt system availability, the integrity of user interactions and data input can be affected. This could result in unauthorized actions performed under the guise of legitimate users, potentially impacting administrative functions or student records. The public disclosure of the exploit increases the likelihood of opportunistic attacks, especially in environments where user awareness and security controls are limited. The impact is more pronounced in institutions with large user bases, as the scale of potential victims increases. Additionally, reputational damage and compliance issues related to data protection regulations such as GDPR may arise if user data is manipulated or misused due to this vulnerability.
Mitigation Recommendations
Organizations should prioritize deploying any official patches or updates from code-projects as soon as they become available. In the absence of a patch, implement strict input validation and output encoding on all user-supplied data, especially in the /register.php endpoint, to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Educate users about the risks of clicking on suspicious links or submitting untrusted forms to reduce the likelihood of successful exploitation. Regularly audit and monitor web application logs for unusual activities indicative of XSS attempts. Consider deploying Web Application Firewalls (WAFs) configured to detect and block XSS payloads targeting the Student Information System. Finally, review and harden session management mechanisms to limit the impact of potential session hijacking.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-13244: Cross Site Scripting in code-projects Student Information System
Description
A vulnerability was determined in code-projects Student Information System 2.0. The affected element is an unknown function of the file /register.php. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-13244 is a Cross Site Scripting (XSS) vulnerability identified in the code-projects Student Information System version 2.0. The vulnerability resides in an unspecified function within the /register.php file, which processes user input in a manner that allows malicious scripts to be injected and executed in the context of the victim's browser. This flaw can be exploited remotely without authentication, but requires user interaction, such as clicking a crafted link or submitting a malicious form. The vulnerability does not compromise confidentiality or availability directly but can affect integrity by enabling attackers to execute arbitrary scripts, potentially leading to session hijacking, phishing attacks, or unauthorized actions performed on behalf of the user. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no active exploitation has been reported yet. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and limited impact on integrity with no impact on confidentiality or availability. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for interim mitigations. The Student Information System is typically deployed in educational environments, making students, faculty, and administrative users potential targets. The vulnerability's exploitation could undermine trust in the system and lead to data manipulation or social engineering attacks.
Potential Impact
For European organizations, particularly educational institutions using the code-projects Student Information System 2.0, this vulnerability poses a risk of client-side attacks that can compromise user sessions and lead to phishing or social engineering campaigns. While it does not directly expose sensitive data or disrupt system availability, the integrity of user interactions and data input can be affected. This could result in unauthorized actions performed under the guise of legitimate users, potentially impacting administrative functions or student records. The public disclosure of the exploit increases the likelihood of opportunistic attacks, especially in environments where user awareness and security controls are limited. The impact is more pronounced in institutions with large user bases, as the scale of potential victims increases. Additionally, reputational damage and compliance issues related to data protection regulations such as GDPR may arise if user data is manipulated or misused due to this vulnerability.
Mitigation Recommendations
Organizations should prioritize deploying any official patches or updates from code-projects as soon as they become available. In the absence of a patch, implement strict input validation and output encoding on all user-supplied data, especially in the /register.php endpoint, to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Educate users about the risks of clicking on suspicious links or submitting untrusted forms to reduce the likelihood of successful exploitation. Regularly audit and monitor web application logs for unusual activities indicative of XSS attempts. Consider deploying Web Application Firewalls (WAFs) configured to detect and block XSS payloads targeting the Student Information System. Finally, review and harden session management mechanisms to limit the impact of potential session hijacking.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-15T06:57:22.342Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69198d7a1be9ed16ddc78a30
Added to database: 11/16/2025, 8:38:18 AM
Last enriched: 11/16/2025, 8:50:44 AM
Last updated: 11/16/2025, 11:35:32 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13248: SQL Injection in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-13247: SQL Injection in PHPGurukul Tourism Management System
MediumCVE-2025-13246: Path Traversal in shsuishang ShopSuite ModulithShop
MediumCVE-2025-13245: Cross Site Scripting in code-projects Student Information System
MediumCVE-2025-13243: SQL Injection in code-projects Student Information System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.