Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13245: Cross Site Scripting in code-projects Student Information System

0
Medium
VulnerabilityCVE-2025-13245cvecve-2025-13245
Published: Sun Nov 16 2025 (11/16/2025, 09:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Student Information System

Description

A vulnerability was identified in code-projects Student Information System 2.0. The impacted element is an unknown function of the file /editprofile.php. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 11/23/2025, 10:00:38 UTC

Technical Analysis

CVE-2025-13245 is a cross-site scripting (XSS) vulnerability identified in the code-projects Student Information System version 2.0, specifically within the /editprofile.php script. The vulnerability arises from insufficient sanitization of user-supplied input, allowing attackers to inject malicious JavaScript code that executes in the context of the victim’s browser. This flaw can be exploited remotely without authentication, although user interaction is required to trigger the malicious payload, such as by visiting a crafted URL or clicking a malicious link. The vulnerability primarily impacts the confidentiality and integrity of user sessions by enabling theft of session cookies, defacement of web pages, or execution of unauthorized actions on behalf of the victim. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed (UI:P), resulting in a medium severity score of 5.1. While no active exploits have been reported in the wild, proof-of-concept code is publicly available, increasing the risk of exploitation. The lack of vendor patches at this time necessitates immediate mitigation efforts by affected organizations. The vulnerability is particularly concerning for educational institutions managing sensitive student information, as exploitation could lead to unauthorized data disclosure or manipulation. The attack surface is limited to the affected version 2.0 of the Student Information System, which narrows the scope but still poses a significant risk where deployed.

Potential Impact

For European organizations, especially educational institutions using the code-projects Student Information System 2.0, this vulnerability poses risks including unauthorized access to student data, session hijacking, and potential manipulation of user profiles. Such impacts can lead to breaches of personal data protected under GDPR, resulting in legal and financial consequences. The integrity of student records and profiles could be compromised, undermining trust in institutional IT systems. Additionally, successful exploitation might facilitate further attacks within the network if attackers leverage stolen credentials or session tokens. The medium severity rating reflects moderate impact potential, but the ease of remote exploitation without authentication increases urgency. Disruption to educational services and reputational damage are also possible, particularly if attackers deface portals or leak sensitive information. The vulnerability’s presence in a widely used student information system amplifies the potential scale of impact across multiple European countries.

Mitigation Recommendations

Organizations should immediately audit their use of the code-projects Student Information System and identify any deployments of version 2.0. Until an official patch is released, implement strict input validation and output encoding on all user inputs, especially those handled by /editprofile.php, to neutralize malicious scripts. Deploy web application firewalls (WAFs) with rules specifically targeting XSS attack patterns to provide an additional layer of defense. Educate users about the risks of clicking suspicious links and encourage cautious behavior to reduce successful exploitation via social engineering. Monitor web server logs and application behavior for signs of attempted XSS attacks or unusual activity. Coordinate with the vendor to obtain timely patches and apply them as soon as they become available. Consider isolating or restricting access to the vulnerable system to trusted networks only, reducing exposure to external attackers. Regularly review and update security policies related to web application security and incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-15T06:57:25.592Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69199619be70e745c858593a

Added to database: 11/16/2025, 9:15:05 AM

Last enriched: 11/23/2025, 10:00:38 AM

Last updated: 1/7/2026, 9:23:34 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats