Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13484: Cross Site Scripting in Campcodes Complete Online Beauty Parlor Management System

0
Medium
VulnerabilityCVE-2025-13484cvecve-2025-13484
Published: Thu Nov 20 2025 (11/20/2025, 22:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Complete Online Beauty Parlor Management System

Description

A vulnerability was identified in Campcodes Complete Online Beauty Parlor Management System 1.0. This vulnerability affects unknown code of the file /admin/customer-list.php. The manipulation of the argument Name leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 11/20/2025, 22:55:02 UTC

Technical Analysis

CVE-2025-13484 is a cross-site scripting (XSS) vulnerability identified in Campcodes Complete Online Beauty Parlor Management System version 1.0. The vulnerability exists in the /admin/customer-list.php file, where the 'Name' parameter is improperly sanitized, allowing an attacker to inject malicious JavaScript code. This flaw enables remote attackers to execute scripts in the context of the administrator's browser session. The vulnerability requires the attacker to have high privileges (PR:H), indicating that the attacker must already have some level of authenticated access to the admin panel. Additionally, user interaction (UI:P) is necessary, meaning the admin must interact with the malicious payload, such as clicking a crafted link or viewing a manipulated page. The CVSS 4.0 vector indicates no confidentiality impact (VC:N), low integrity impact (VI:L), and no availability impact (VA:N). The attack complexity is low (AC:L), and no privileges are required to initiate the attack vector (AV:N), but the overall attack requires high privileges and user interaction. Although no known exploits are currently active in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability could lead to session hijacking, theft of sensitive admin credentials, or unauthorized administrative actions, which could compromise the management system's data integrity and confidentiality. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations using Campcodes Complete Online Beauty Parlor Management System 1.0, this vulnerability poses a risk primarily to the confidentiality and integrity of administrative data. Successful exploitation could allow attackers to hijack admin sessions, steal credentials, or perform unauthorized actions within the management system. This could lead to exposure of customer data, manipulation of appointment or financial records, and potential disruption of business operations. Given the nature of the software, which manages customer and business data for beauty parlors, the impact extends to privacy concerns under GDPR regulations, potentially resulting in regulatory penalties if personal data is compromised. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, especially if internal threat actors or phishing campaigns are involved. The absence of known active exploits reduces immediate risk but the availability of public exploit code increases the likelihood of future attacks. Organizations relying on this software should consider the reputational and operational risks associated with a compromised management system.

Mitigation Recommendations

1. Immediately restrict access to the /admin/customer-list.php page to trusted administrators only, ideally via IP whitelisting or VPN access. 2. Implement strict input validation and output encoding on the 'Name' parameter to prevent injection of malicious scripts; use secure coding practices such as context-aware escaping. 3. Monitor administrative accounts for unusual activity or login patterns that could indicate exploitation attempts. 4. Educate administrators about phishing and social engineering risks that could facilitate user interaction required for exploitation. 5. Deploy web application firewalls (WAF) with custom rules to detect and block XSS payloads targeting the vulnerable parameter. 6. Regularly check for vendor patches or updates addressing this vulnerability and apply them promptly once available. 7. Conduct security audits and penetration testing focused on the admin interface to identify and remediate similar vulnerabilities. 8. Implement multi-factor authentication (MFA) for admin accounts to reduce the risk of credential compromise. 9. Backup critical data regularly and ensure recovery procedures are tested to mitigate potential data integrity issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-20T17:03:00.410Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691f98772b54a79d3490b338

Added to database: 11/20/2025, 10:38:47 PM

Last enriched: 11/20/2025, 10:55:02 PM

Last updated: 11/21/2025, 12:01:33 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats