CVE-2025-13795: Cross Site Scripting in codingWithElias School Management System
A weakness has been identified in codingWithElias School Management System up to f1ac334bfd89ae9067cc14dea12ec6ff3f078c01. Affected is an unknown function of the file /student-view.php of the component Edit Student Info Page. This manipulation of the argument First Name causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13795 identifies a cross-site scripting (XSS) vulnerability in the codingWithElias School Management System, affecting the Edit Student Info Page located in /student-view.php. The vulnerability stems from insufficient input validation and sanitization of the 'First Name' parameter, which allows an attacker to inject malicious JavaScript code. This flaw can be exploited remotely by manipulating the input fields, potentially leading to the execution of arbitrary scripts in the context of the victim's browser. The vulnerability requires the attacker to have privileges to edit student information, implying some level of authenticated access, and user interaction is necessary for the payload to execute. The CVSS 4.0 score is 4.8 (medium severity), reflecting the moderate impact and exploitation complexity. The product follows a rolling release model, complicating version tracking and patching. The vendor has not responded to the vulnerability disclosure, and no official patches or updates have been released. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of exploitation attempts. This vulnerability could be leveraged to steal session cookies, perform phishing attacks, or deface the user interface, impacting confidentiality and integrity of user data within the school management system.
Potential Impact
For European organizations, particularly educational institutions using the codingWithElias School Management System, this vulnerability poses risks to the confidentiality and integrity of student and staff data. Successful exploitation could allow attackers to execute malicious scripts, potentially leading to session hijacking, unauthorized data access, or manipulation of displayed information. This could result in data breaches, loss of trust, and compliance violations under regulations such as GDPR. The medium severity rating indicates that while the vulnerability is not critical, it can still be leveraged for targeted attacks, especially in environments where multiple users have editing privileges. The lack of vendor response and patches increases exposure time, raising the risk of exploitation. Additionally, the rolling release nature of the product complicates timely detection and remediation. European schools and educational bodies could face reputational damage and operational disruptions if attackers exploit this vulnerability to spread malware or conduct phishing campaigns within their networks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and sanitization on all user-supplied data, especially the 'First Name' field and other potentially affected parameters. Employing context-aware output encoding (e.g., HTML entity encoding) before rendering user inputs can prevent script execution. Restrict editing privileges to trusted users and enforce the principle of least privilege to limit potential attackers' access. Implement Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the sources of executable scripts. Regularly monitor application logs for suspicious input patterns or unusual user activity. Since no official patches are available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this endpoint. Engage in proactive vulnerability scanning and penetration testing to identify similar weaknesses. Finally, maintain communication channels with the vendor or community to receive updates or unofficial patches promptly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-13795: Cross Site Scripting in codingWithElias School Management System
Description
A weakness has been identified in codingWithElias School Management System up to f1ac334bfd89ae9067cc14dea12ec6ff3f078c01. Affected is an unknown function of the file /student-view.php of the component Edit Student Info Page. This manipulation of the argument First Name causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13795 identifies a cross-site scripting (XSS) vulnerability in the codingWithElias School Management System, affecting the Edit Student Info Page located in /student-view.php. The vulnerability stems from insufficient input validation and sanitization of the 'First Name' parameter, which allows an attacker to inject malicious JavaScript code. This flaw can be exploited remotely by manipulating the input fields, potentially leading to the execution of arbitrary scripts in the context of the victim's browser. The vulnerability requires the attacker to have privileges to edit student information, implying some level of authenticated access, and user interaction is necessary for the payload to execute. The CVSS 4.0 score is 4.8 (medium severity), reflecting the moderate impact and exploitation complexity. The product follows a rolling release model, complicating version tracking and patching. The vendor has not responded to the vulnerability disclosure, and no official patches or updates have been released. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of exploitation attempts. This vulnerability could be leveraged to steal session cookies, perform phishing attacks, or deface the user interface, impacting confidentiality and integrity of user data within the school management system.
Potential Impact
For European organizations, particularly educational institutions using the codingWithElias School Management System, this vulnerability poses risks to the confidentiality and integrity of student and staff data. Successful exploitation could allow attackers to execute malicious scripts, potentially leading to session hijacking, unauthorized data access, or manipulation of displayed information. This could result in data breaches, loss of trust, and compliance violations under regulations such as GDPR. The medium severity rating indicates that while the vulnerability is not critical, it can still be leveraged for targeted attacks, especially in environments where multiple users have editing privileges. The lack of vendor response and patches increases exposure time, raising the risk of exploitation. Additionally, the rolling release nature of the product complicates timely detection and remediation. European schools and educational bodies could face reputational damage and operational disruptions if attackers exploit this vulnerability to spread malware or conduct phishing campaigns within their networks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and sanitization on all user-supplied data, especially the 'First Name' field and other potentially affected parameters. Employing context-aware output encoding (e.g., HTML entity encoding) before rendering user inputs can prevent script execution. Restrict editing privileges to trusted users and enforce the principle of least privilege to limit potential attackers' access. Implement Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the sources of executable scripts. Regularly monitor application logs for suspicious input patterns or unusual user activity. Since no official patches are available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this endpoint. Engage in proactive vulnerability scanning and penetration testing to identify similar weaknesses. Finally, maintain communication channels with the vendor or community to receive updates or unofficial patches promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-30T13:49:03.382Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692cd072a283b5b3e9fecc42
Added to database: 11/30/2025, 11:17:06 PM
Last enriched: 11/30/2025, 11:32:00 PM
Last updated: 12/5/2025, 2:23:34 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.