CVE-2025-14200: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14200 identifies a cross-site scripting (XSS) vulnerability in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php software, affecting an unknown function within the /usersub.php file, specifically the Request Pending Page component. The vulnerability arises from insufficient sanitization or encoding of user-supplied input, allowing attackers to inject malicious JavaScript code that executes in the context of other users' browsers. This can be exploited remotely without authentication, although user interaction is required to trigger the malicious payload. The product uses a rolling release model, complicating version tracking and patch availability; the vendor has not responded to disclosure attempts, and no official patches exist. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact on confidentiality and integrity. The vulnerability could enable attackers to hijack user sessions, steal credentials, or perform unauthorized actions within the hotel management system, potentially compromising sensitive customer and operational data. The public disclosure of exploit details increases the risk of exploitation, especially in environments where the software is deployed without mitigations. The lack of vendor response and patch availability necessitates immediate defensive measures by users of this software.
Potential Impact
For European organizations, particularly those in the hospitality sector using the affected hotel management software, this vulnerability poses a risk to the confidentiality and integrity of customer data and internal operations. Successful exploitation could lead to session hijacking, unauthorized access to user accounts, and manipulation of booking or payment information. This can result in financial losses, reputational damage, and regulatory non-compliance under GDPR due to exposure of personal data. The vulnerability’s remote exploitability without authentication increases the attack surface, especially for publicly accessible management portals. Given the hospitality industry's importance in countries like Germany, France, Spain, and Italy, exploitation could disrupt services and erode customer trust. The absence of vendor patches and the public availability of exploit details further heighten the threat level, necessitating proactive mitigation to prevent potential attacks.
Mitigation Recommendations
1. Implement strict input validation and output encoding on the /usersub.php Request Pending Page to neutralize malicious scripts, using established libraries or frameworks that handle XSS prevention. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Conduct thorough code reviews and security testing focusing on all user input handling points within the application. 4. Isolate the affected component behind additional authentication or network segmentation to reduce exposure. 5. Educate users and administrators about the risks of clicking suspicious links or executing untrusted scripts. 6. Monitor web server logs and application behavior for signs of attempted XSS exploitation or anomalous activity. 7. If feasible, consider migrating to alternative hotel management solutions with active security support until a patch or update is available. 8. Regularly update all related software dependencies and underlying platforms to minimize other vulnerabilities.
Affected Countries
Germany, France, Spain, Italy, United Kingdom, Netherlands
CVE-2025-14200: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
Description
A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14200 identifies a cross-site scripting (XSS) vulnerability in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php software, affecting an unknown function within the /usersub.php file, specifically the Request Pending Page component. The vulnerability arises from insufficient sanitization or encoding of user-supplied input, allowing attackers to inject malicious JavaScript code that executes in the context of other users' browsers. This can be exploited remotely without authentication, although user interaction is required to trigger the malicious payload. The product uses a rolling release model, complicating version tracking and patch availability; the vendor has not responded to disclosure attempts, and no official patches exist. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact on confidentiality and integrity. The vulnerability could enable attackers to hijack user sessions, steal credentials, or perform unauthorized actions within the hotel management system, potentially compromising sensitive customer and operational data. The public disclosure of exploit details increases the risk of exploitation, especially in environments where the software is deployed without mitigations. The lack of vendor response and patch availability necessitates immediate defensive measures by users of this software.
Potential Impact
For European organizations, particularly those in the hospitality sector using the affected hotel management software, this vulnerability poses a risk to the confidentiality and integrity of customer data and internal operations. Successful exploitation could lead to session hijacking, unauthorized access to user accounts, and manipulation of booking or payment information. This can result in financial losses, reputational damage, and regulatory non-compliance under GDPR due to exposure of personal data. The vulnerability’s remote exploitability without authentication increases the attack surface, especially for publicly accessible management portals. Given the hospitality industry's importance in countries like Germany, France, Spain, and Italy, exploitation could disrupt services and erode customer trust. The absence of vendor patches and the public availability of exploit details further heighten the threat level, necessitating proactive mitigation to prevent potential attacks.
Mitigation Recommendations
1. Implement strict input validation and output encoding on the /usersub.php Request Pending Page to neutralize malicious scripts, using established libraries or frameworks that handle XSS prevention. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Conduct thorough code reviews and security testing focusing on all user input handling points within the application. 4. Isolate the affected component behind additional authentication or network segmentation to reduce exposure. 5. Educate users and administrators about the risks of clicking suspicious links or executing untrusted scripts. 6. Monitor web server logs and application behavior for signs of attempted XSS exploitation or anomalous activity. 7. If feasible, consider migrating to alternative hotel management solutions with active security support until a patch or update is available. 8. Regularly update all related software dependencies and underlying platforms to minimize other vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T17:38:26.573Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6935bc191ce29f222165335e
Added to database: 12/7/2025, 5:40:41 PM
Last enriched: 12/14/2025, 6:03:11 PM
Last updated: 2/3/2026, 7:55:53 PM
Views: 152
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24441: CWE-319 Cleartext Transmission of Sensitive Information in Shenzhen Tenda Technology Co., Ltd. Tenda AC7
HighCVE-2026-24434: CWE-352 Cross-Site Request Forgery (CSRF) in Shenzhen Tenda Technology Co., Ltd. Tenda AC7
MediumCVE-2026-1846
UnknownCVE-2025-64438: CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop') in eProsima Fast-DDS
LowCVE-2025-64098: CWE-125 Out-of-bounds Read in eProsima Fast-DDS
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.