CVE-2025-13245: Cross Site Scripting in code-projects Student Information System
A vulnerability was identified in code-projects Student Information System 2.0. The impacted element is an unknown function of the file /editprofile.php. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-13245 affects the code-projects Student Information System version 2.0, specifically within an unspecified function in the /editprofile.php file. This flaw is a Cross Site Scripting (XSS) vulnerability, which allows attackers to inject malicious client-side scripts into web pages viewed by other users. The vulnerability is remotely exploitable without requiring authentication or privileges, but it does require user interaction, such as clicking a crafted link or visiting a malicious page. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector as network (remote), low attack complexity, no privileges required, but user interaction necessary. The impact primarily affects confidentiality and integrity to a limited extent, enabling potential session hijacking, theft of cookies, or defacement of user profiles. No availability impact or scope change is indicated. Although no known exploits are currently active in the wild, public exploit code is available, increasing the risk of future exploitation. The vulnerability arises from insufficient input sanitization or output encoding in the edit profile functionality, allowing script injection. This type of vulnerability is common in web applications lacking robust input validation frameworks. The Student Information System is typically used by educational institutions to manage student data, making it a potential target for attackers seeking to compromise sensitive personal information or disrupt academic operations.
Potential Impact
For European organizations, particularly educational institutions using the code-projects Student Information System, this vulnerability poses a risk of unauthorized access to user sessions and potential data theft. Attackers could exploit the XSS flaw to steal authentication cookies, perform actions on behalf of users, or deliver malware via injected scripts. While the impact on availability is minimal, the confidentiality and integrity of student and staff data could be compromised. This could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and operational disruptions. Since the vulnerability requires user interaction, phishing or social engineering campaigns might be used to increase exploitation success. The presence of public exploit code raises the likelihood of opportunistic attacks. Organizations with limited cybersecurity maturity or lacking web application security controls are particularly vulnerable. The medium severity rating suggests that while the threat is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Apply vendor patches immediately once released to address the vulnerability in /editprofile.php. 2. Implement strict input validation on all user-supplied data, especially in profile editing functionalities, to reject or sanitize potentially malicious scripts. 3. Employ output encoding techniques (e.g., HTML entity encoding) to neutralize injected scripts before rendering in browsers. 4. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce XSS impact. 5. Conduct regular security assessments and code reviews focusing on input handling and output encoding. 6. Educate users about phishing and social engineering risks to reduce successful exploitation via user interaction. 7. Monitor web application logs for suspicious activities indicative of XSS attempts. 8. Consider implementing web application firewalls (WAFs) with rules targeting XSS attack patterns. 9. Limit user privileges where possible to reduce potential damage from compromised accounts. 10. Maintain an incident response plan to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-13245: Cross Site Scripting in code-projects Student Information System
Description
A vulnerability was identified in code-projects Student Information System 2.0. The impacted element is an unknown function of the file /editprofile.php. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-13245 affects the code-projects Student Information System version 2.0, specifically within an unspecified function in the /editprofile.php file. This flaw is a Cross Site Scripting (XSS) vulnerability, which allows attackers to inject malicious client-side scripts into web pages viewed by other users. The vulnerability is remotely exploitable without requiring authentication or privileges, but it does require user interaction, such as clicking a crafted link or visiting a malicious page. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector as network (remote), low attack complexity, no privileges required, but user interaction necessary. The impact primarily affects confidentiality and integrity to a limited extent, enabling potential session hijacking, theft of cookies, or defacement of user profiles. No availability impact or scope change is indicated. Although no known exploits are currently active in the wild, public exploit code is available, increasing the risk of future exploitation. The vulnerability arises from insufficient input sanitization or output encoding in the edit profile functionality, allowing script injection. This type of vulnerability is common in web applications lacking robust input validation frameworks. The Student Information System is typically used by educational institutions to manage student data, making it a potential target for attackers seeking to compromise sensitive personal information or disrupt academic operations.
Potential Impact
For European organizations, particularly educational institutions using the code-projects Student Information System, this vulnerability poses a risk of unauthorized access to user sessions and potential data theft. Attackers could exploit the XSS flaw to steal authentication cookies, perform actions on behalf of users, or deliver malware via injected scripts. While the impact on availability is minimal, the confidentiality and integrity of student and staff data could be compromised. This could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and operational disruptions. Since the vulnerability requires user interaction, phishing or social engineering campaigns might be used to increase exploitation success. The presence of public exploit code raises the likelihood of opportunistic attacks. Organizations with limited cybersecurity maturity or lacking web application security controls are particularly vulnerable. The medium severity rating suggests that while the threat is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Apply vendor patches immediately once released to address the vulnerability in /editprofile.php. 2. Implement strict input validation on all user-supplied data, especially in profile editing functionalities, to reject or sanitize potentially malicious scripts. 3. Employ output encoding techniques (e.g., HTML entity encoding) to neutralize injected scripts before rendering in browsers. 4. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce XSS impact. 5. Conduct regular security assessments and code reviews focusing on input handling and output encoding. 6. Educate users about phishing and social engineering risks to reduce successful exploitation via user interaction. 7. Monitor web application logs for suspicious activities indicative of XSS attempts. 8. Consider implementing web application firewalls (WAFs) with rules targeting XSS attack patterns. 9. Limit user privileges where possible to reduce potential damage from compromised accounts. 10. Maintain an incident response plan to quickly address any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-15T06:57:25.592Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69199619be70e745c858593a
Added to database: 11/16/2025, 9:15:05 AM
Last enriched: 11/16/2025, 9:19:53 AM
Last updated: 11/16/2025, 12:19:40 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13249: Unrestricted Upload in Jiusi OA
MediumCVE-2025-13248: SQL Injection in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-13247: SQL Injection in PHPGurukul Tourism Management System
MediumCVE-2025-13246: Path Traversal in shsuishang ShopSuite ModulithShop
MediumCVE-2025-13244: Cross Site Scripting in code-projects Student Information System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.