CVE-2025-13244: Cross Site Scripting in code-projects Student Information System
A vulnerability was determined in code-projects Student Information System 2.0. The affected element is an unknown function of the file /register.php. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-13244 affects the code-projects Student Information System version 2.0. It is a Cross Site Scripting (XSS) flaw located in an unspecified function within the /register.php file. This vulnerability allows an attacker to inject malicious scripts remotely without requiring any authentication, exploiting insufficient input validation or output encoding in the registration process. The attack vector is network-based with low attack complexity and no privileges required, but it requires user interaction to trigger the malicious payload. The impact primarily affects the integrity of user sessions and potentially confidentiality if session cookies or sensitive data are exposed through the injected scripts. The CVSS 4.0 base score of 5.3 reflects a medium severity rating, indicating moderate risk. No patches have been published yet, and while the exploit code has been publicly disclosed, no active exploitation has been observed. This vulnerability could be leveraged for phishing, session hijacking, or defacement attacks targeting users of the Student Information System, which is commonly deployed in educational environments to manage student data and registration processes.
Potential Impact
For European organizations, particularly educational institutions using the code-projects Student Information System, this vulnerability poses a moderate risk. Successful exploitation could lead to session hijacking, allowing attackers to impersonate legitimate users, potentially gaining unauthorized access to sensitive student information. It could also facilitate phishing attacks by injecting malicious scripts that redirect users to fraudulent sites or steal credentials. Although the vulnerability does not directly compromise system availability or allow privilege escalation, the exposure of personal data could lead to regulatory non-compliance under GDPR, resulting in legal and financial repercussions. The need for user interaction limits automated exploitation but does not eliminate risk, especially in environments where users may be less security-aware. The absence of a patch increases the window of exposure, necessitating immediate mitigation efforts. Overall, the impact is significant due to the sensitivity of educational data and the potential for reputational damage to affected institutions.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on all user-supplied data in the /register.php functionality to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct security awareness training for users to recognize and avoid phishing attempts that may leverage this vulnerability. Monitor web server logs and application behavior for unusual requests or signs of attempted XSS exploitation. If possible, isolate the Student Information System behind a web application firewall (WAF) configured to detect and block XSS payloads. Since no official patch is available, consider temporarily disabling or restricting the vulnerable registration feature or requiring additional verification steps during registration. Regularly check for vendor updates or patches and apply them promptly once released. Additionally, implement multi-factor authentication (MFA) for user accounts to reduce the impact of session hijacking.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13244: Cross Site Scripting in code-projects Student Information System
Description
A vulnerability was determined in code-projects Student Information System 2.0. The affected element is an unknown function of the file /register.php. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-13244 affects the code-projects Student Information System version 2.0. It is a Cross Site Scripting (XSS) flaw located in an unspecified function within the /register.php file. This vulnerability allows an attacker to inject malicious scripts remotely without requiring any authentication, exploiting insufficient input validation or output encoding in the registration process. The attack vector is network-based with low attack complexity and no privileges required, but it requires user interaction to trigger the malicious payload. The impact primarily affects the integrity of user sessions and potentially confidentiality if session cookies or sensitive data are exposed through the injected scripts. The CVSS 4.0 base score of 5.3 reflects a medium severity rating, indicating moderate risk. No patches have been published yet, and while the exploit code has been publicly disclosed, no active exploitation has been observed. This vulnerability could be leveraged for phishing, session hijacking, or defacement attacks targeting users of the Student Information System, which is commonly deployed in educational environments to manage student data and registration processes.
Potential Impact
For European organizations, particularly educational institutions using the code-projects Student Information System, this vulnerability poses a moderate risk. Successful exploitation could lead to session hijacking, allowing attackers to impersonate legitimate users, potentially gaining unauthorized access to sensitive student information. It could also facilitate phishing attacks by injecting malicious scripts that redirect users to fraudulent sites or steal credentials. Although the vulnerability does not directly compromise system availability or allow privilege escalation, the exposure of personal data could lead to regulatory non-compliance under GDPR, resulting in legal and financial repercussions. The need for user interaction limits automated exploitation but does not eliminate risk, especially in environments where users may be less security-aware. The absence of a patch increases the window of exposure, necessitating immediate mitigation efforts. Overall, the impact is significant due to the sensitivity of educational data and the potential for reputational damage to affected institutions.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on all user-supplied data in the /register.php functionality to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct security awareness training for users to recognize and avoid phishing attempts that may leverage this vulnerability. Monitor web server logs and application behavior for unusual requests or signs of attempted XSS exploitation. If possible, isolate the Student Information System behind a web application firewall (WAF) configured to detect and block XSS payloads. Since no official patch is available, consider temporarily disabling or restricting the vulnerable registration feature or requiring additional verification steps during registration. Regularly check for vendor updates or patches and apply them promptly once released. Additionally, implement multi-factor authentication (MFA) for user accounts to reduce the impact of session hijacking.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-15T06:57:22.342Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69198d7a1be9ed16ddc78a30
Added to database: 11/16/2025, 8:38:18 AM
Last enriched: 11/23/2025, 9:03:22 AM
Last updated: 1/7/2026, 9:23:21 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.