Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13795: Cross Site Scripting in codingWithElias School Management System

0
Medium
VulnerabilityCVE-2025-13795cvecve-2025-13795
Published: Sun Nov 30 2025 (11/30/2025, 23:02:06 UTC)
Source: CVE Database V5
Vendor/Project: codingWithElias
Product: School Management System

Description

A weakness has been identified in codingWithElias School Management System up to f1ac334bfd89ae9067cc14dea12ec6ff3f078c01. Affected is an unknown function of the file /student-view.php of the component Edit Student Info Page. This manipulation of the argument First Name causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/30/2025, 23:32:00 UTC

Technical Analysis

CVE-2025-13795 identifies a cross-site scripting (XSS) vulnerability in the codingWithElias School Management System, affecting the Edit Student Info Page located in /student-view.php. The vulnerability stems from insufficient input validation and sanitization of the 'First Name' parameter, which allows an attacker to inject malicious JavaScript code. This flaw can be exploited remotely by manipulating the input fields, potentially leading to the execution of arbitrary scripts in the context of the victim's browser. The vulnerability requires the attacker to have privileges to edit student information, implying some level of authenticated access, and user interaction is necessary for the payload to execute. The CVSS 4.0 score is 4.8 (medium severity), reflecting the moderate impact and exploitation complexity. The product follows a rolling release model, complicating version tracking and patching. The vendor has not responded to the vulnerability disclosure, and no official patches or updates have been released. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of exploitation attempts. This vulnerability could be leveraged to steal session cookies, perform phishing attacks, or deface the user interface, impacting confidentiality and integrity of user data within the school management system.

Potential Impact

For European organizations, particularly educational institutions using the codingWithElias School Management System, this vulnerability poses risks to the confidentiality and integrity of student and staff data. Successful exploitation could allow attackers to execute malicious scripts, potentially leading to session hijacking, unauthorized data access, or manipulation of displayed information. This could result in data breaches, loss of trust, and compliance violations under regulations such as GDPR. The medium severity rating indicates that while the vulnerability is not critical, it can still be leveraged for targeted attacks, especially in environments where multiple users have editing privileges. The lack of vendor response and patches increases exposure time, raising the risk of exploitation. Additionally, the rolling release nature of the product complicates timely detection and remediation. European schools and educational bodies could face reputational damage and operational disruptions if attackers exploit this vulnerability to spread malware or conduct phishing campaigns within their networks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and sanitization on all user-supplied data, especially the 'First Name' field and other potentially affected parameters. Employing context-aware output encoding (e.g., HTML entity encoding) before rendering user inputs can prevent script execution. Restrict editing privileges to trusted users and enforce the principle of least privilege to limit potential attackers' access. Implement Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the sources of executable scripts. Regularly monitor application logs for suspicious input patterns or unusual user activity. Since no official patches are available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this endpoint. Engage in proactive vulnerability scanning and penetration testing to identify similar weaknesses. Finally, maintain communication channels with the vendor or community to receive updates or unofficial patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-30T13:49:03.382Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692cd072a283b5b3e9fecc42

Added to database: 11/30/2025, 11:17:06 PM

Last enriched: 11/30/2025, 11:32:00 PM

Last updated: 12/5/2025, 2:23:34 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats