Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13245: Cross Site Scripting in code-projects Student Information System

0
Medium
VulnerabilityCVE-2025-13245cvecve-2025-13245
Published: Sun Nov 16 2025 (11/16/2025, 09:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Student Information System

Description

A vulnerability was identified in code-projects Student Information System 2.0. The impacted element is an unknown function of the file /editprofile.php. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 11/16/2025, 09:19:53 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13245 affects the code-projects Student Information System version 2.0, specifically within an unspecified function in the /editprofile.php file. This flaw is a Cross Site Scripting (XSS) vulnerability, which allows attackers to inject malicious client-side scripts into web pages viewed by other users. The vulnerability is remotely exploitable without requiring authentication or privileges, but it does require user interaction, such as clicking a crafted link or visiting a malicious page. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector as network (remote), low attack complexity, no privileges required, but user interaction necessary. The impact primarily affects confidentiality and integrity to a limited extent, enabling potential session hijacking, theft of cookies, or defacement of user profiles. No availability impact or scope change is indicated. Although no known exploits are currently active in the wild, public exploit code is available, increasing the risk of future exploitation. The vulnerability arises from insufficient input sanitization or output encoding in the edit profile functionality, allowing script injection. This type of vulnerability is common in web applications lacking robust input validation frameworks. The Student Information System is typically used by educational institutions to manage student data, making it a potential target for attackers seeking to compromise sensitive personal information or disrupt academic operations.

Potential Impact

For European organizations, particularly educational institutions using the code-projects Student Information System, this vulnerability poses a risk of unauthorized access to user sessions and potential data theft. Attackers could exploit the XSS flaw to steal authentication cookies, perform actions on behalf of users, or deliver malware via injected scripts. While the impact on availability is minimal, the confidentiality and integrity of student and staff data could be compromised. This could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and operational disruptions. Since the vulnerability requires user interaction, phishing or social engineering campaigns might be used to increase exploitation success. The presence of public exploit code raises the likelihood of opportunistic attacks. Organizations with limited cybersecurity maturity or lacking web application security controls are particularly vulnerable. The medium severity rating suggests that while the threat is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Apply vendor patches immediately once released to address the vulnerability in /editprofile.php. 2. Implement strict input validation on all user-supplied data, especially in profile editing functionalities, to reject or sanitize potentially malicious scripts. 3. Employ output encoding techniques (e.g., HTML entity encoding) to neutralize injected scripts before rendering in browsers. 4. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce XSS impact. 5. Conduct regular security assessments and code reviews focusing on input handling and output encoding. 6. Educate users about phishing and social engineering risks to reduce successful exploitation via user interaction. 7. Monitor web application logs for suspicious activities indicative of XSS attempts. 8. Consider implementing web application firewalls (WAFs) with rules targeting XSS attack patterns. 9. Limit user privileges where possible to reduce potential damage from compromised accounts. 10. Maintain an incident response plan to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-15T06:57:25.592Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69199619be70e745c858593a

Added to database: 11/16/2025, 9:15:05 AM

Last enriched: 11/16/2025, 9:19:53 AM

Last updated: 11/16/2025, 12:19:40 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats