CVE-2025-13245: Cross Site Scripting in code-projects Student Information System
A vulnerability was identified in code-projects Student Information System 2.0. The impacted element is an unknown function of the file /editprofile.php. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-13245 is a cross-site scripting (XSS) vulnerability identified in the code-projects Student Information System version 2.0, specifically within the /editprofile.php script. The vulnerability arises from insufficient sanitization of user-supplied input, allowing attackers to inject malicious JavaScript code that executes in the context of the victim’s browser. This flaw can be exploited remotely without authentication, although user interaction is required to trigger the malicious payload, such as by visiting a crafted URL or clicking a malicious link. The vulnerability primarily impacts the confidentiality and integrity of user sessions by enabling theft of session cookies, defacement of web pages, or execution of unauthorized actions on behalf of the victim. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed (UI:P), resulting in a medium severity score of 5.1. While no active exploits have been reported in the wild, proof-of-concept code is publicly available, increasing the risk of exploitation. The lack of vendor patches at this time necessitates immediate mitigation efforts by affected organizations. The vulnerability is particularly concerning for educational institutions managing sensitive student information, as exploitation could lead to unauthorized data disclosure or manipulation. The attack surface is limited to the affected version 2.0 of the Student Information System, which narrows the scope but still poses a significant risk where deployed.
Potential Impact
For European organizations, especially educational institutions using the code-projects Student Information System 2.0, this vulnerability poses risks including unauthorized access to student data, session hijacking, and potential manipulation of user profiles. Such impacts can lead to breaches of personal data protected under GDPR, resulting in legal and financial consequences. The integrity of student records and profiles could be compromised, undermining trust in institutional IT systems. Additionally, successful exploitation might facilitate further attacks within the network if attackers leverage stolen credentials or session tokens. The medium severity rating reflects moderate impact potential, but the ease of remote exploitation without authentication increases urgency. Disruption to educational services and reputational damage are also possible, particularly if attackers deface portals or leak sensitive information. The vulnerability’s presence in a widely used student information system amplifies the potential scale of impact across multiple European countries.
Mitigation Recommendations
Organizations should immediately audit their use of the code-projects Student Information System and identify any deployments of version 2.0. Until an official patch is released, implement strict input validation and output encoding on all user inputs, especially those handled by /editprofile.php, to neutralize malicious scripts. Deploy web application firewalls (WAFs) with rules specifically targeting XSS attack patterns to provide an additional layer of defense. Educate users about the risks of clicking suspicious links and encourage cautious behavior to reduce successful exploitation via social engineering. Monitor web server logs and application behavior for signs of attempted XSS attacks or unusual activity. Coordinate with the vendor to obtain timely patches and apply them as soon as they become available. Consider isolating or restricting access to the vulnerable system to trusted networks only, reducing exposure to external attackers. Regularly review and update security policies related to web application security and incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-13245: Cross Site Scripting in code-projects Student Information System
Description
A vulnerability was identified in code-projects Student Information System 2.0. The impacted element is an unknown function of the file /editprofile.php. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13245 is a cross-site scripting (XSS) vulnerability identified in the code-projects Student Information System version 2.0, specifically within the /editprofile.php script. The vulnerability arises from insufficient sanitization of user-supplied input, allowing attackers to inject malicious JavaScript code that executes in the context of the victim’s browser. This flaw can be exploited remotely without authentication, although user interaction is required to trigger the malicious payload, such as by visiting a crafted URL or clicking a malicious link. The vulnerability primarily impacts the confidentiality and integrity of user sessions by enabling theft of session cookies, defacement of web pages, or execution of unauthorized actions on behalf of the victim. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed (UI:P), resulting in a medium severity score of 5.1. While no active exploits have been reported in the wild, proof-of-concept code is publicly available, increasing the risk of exploitation. The lack of vendor patches at this time necessitates immediate mitigation efforts by affected organizations. The vulnerability is particularly concerning for educational institutions managing sensitive student information, as exploitation could lead to unauthorized data disclosure or manipulation. The attack surface is limited to the affected version 2.0 of the Student Information System, which narrows the scope but still poses a significant risk where deployed.
Potential Impact
For European organizations, especially educational institutions using the code-projects Student Information System 2.0, this vulnerability poses risks including unauthorized access to student data, session hijacking, and potential manipulation of user profiles. Such impacts can lead to breaches of personal data protected under GDPR, resulting in legal and financial consequences. The integrity of student records and profiles could be compromised, undermining trust in institutional IT systems. Additionally, successful exploitation might facilitate further attacks within the network if attackers leverage stolen credentials or session tokens. The medium severity rating reflects moderate impact potential, but the ease of remote exploitation without authentication increases urgency. Disruption to educational services and reputational damage are also possible, particularly if attackers deface portals or leak sensitive information. The vulnerability’s presence in a widely used student information system amplifies the potential scale of impact across multiple European countries.
Mitigation Recommendations
Organizations should immediately audit their use of the code-projects Student Information System and identify any deployments of version 2.0. Until an official patch is released, implement strict input validation and output encoding on all user inputs, especially those handled by /editprofile.php, to neutralize malicious scripts. Deploy web application firewalls (WAFs) with rules specifically targeting XSS attack patterns to provide an additional layer of defense. Educate users about the risks of clicking suspicious links and encourage cautious behavior to reduce successful exploitation via social engineering. Monitor web server logs and application behavior for signs of attempted XSS attacks or unusual activity. Coordinate with the vendor to obtain timely patches and apply them as soon as they become available. Consider isolating or restricting access to the vulnerable system to trusted networks only, reducing exposure to external attackers. Regularly review and update security policies related to web application security and incident response.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-15T06:57:25.592Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69199619be70e745c858593a
Added to database: 11/16/2025, 9:15:05 AM
Last enriched: 11/23/2025, 10:00:38 AM
Last updated: 1/7/2026, 9:23:34 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.