Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14200: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php

0
Medium
VulnerabilityCVE-2025-14200cvecve-2025-14200
Published: Sun Dec 07 2025 (12/07/2025, 17:32:07 UTC)
Source: CVE Database V5
Vendor/Project: alokjaiswal
Product: Hotel-Management-services-using-MYSQL-and-php

Description

A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/14/2025, 18:03:11 UTC

Technical Analysis

CVE-2025-14200 identifies a cross-site scripting (XSS) vulnerability in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php software, affecting an unknown function within the /usersub.php file, specifically the Request Pending Page component. The vulnerability arises from insufficient sanitization or encoding of user-supplied input, allowing attackers to inject malicious JavaScript code that executes in the context of other users' browsers. This can be exploited remotely without authentication, although user interaction is required to trigger the malicious payload. The product uses a rolling release model, complicating version tracking and patch availability; the vendor has not responded to disclosure attempts, and no official patches exist. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact on confidentiality and integrity. The vulnerability could enable attackers to hijack user sessions, steal credentials, or perform unauthorized actions within the hotel management system, potentially compromising sensitive customer and operational data. The public disclosure of exploit details increases the risk of exploitation, especially in environments where the software is deployed without mitigations. The lack of vendor response and patch availability necessitates immediate defensive measures by users of this software.

Potential Impact

For European organizations, particularly those in the hospitality sector using the affected hotel management software, this vulnerability poses a risk to the confidentiality and integrity of customer data and internal operations. Successful exploitation could lead to session hijacking, unauthorized access to user accounts, and manipulation of booking or payment information. This can result in financial losses, reputational damage, and regulatory non-compliance under GDPR due to exposure of personal data. The vulnerability’s remote exploitability without authentication increases the attack surface, especially for publicly accessible management portals. Given the hospitality industry's importance in countries like Germany, France, Spain, and Italy, exploitation could disrupt services and erode customer trust. The absence of vendor patches and the public availability of exploit details further heighten the threat level, necessitating proactive mitigation to prevent potential attacks.

Mitigation Recommendations

1. Implement strict input validation and output encoding on the /usersub.php Request Pending Page to neutralize malicious scripts, using established libraries or frameworks that handle XSS prevention. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Conduct thorough code reviews and security testing focusing on all user input handling points within the application. 4. Isolate the affected component behind additional authentication or network segmentation to reduce exposure. 5. Educate users and administrators about the risks of clicking suspicious links or executing untrusted scripts. 6. Monitor web server logs and application behavior for signs of attempted XSS exploitation or anomalous activity. 7. If feasible, consider migrating to alternative hotel management solutions with active security support until a patch or update is available. 8. Regularly update all related software dependencies and underlying platforms to minimize other vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T17:38:26.573Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6935bc191ce29f222165335e

Added to database: 12/7/2025, 5:40:41 PM

Last enriched: 12/14/2025, 6:03:11 PM

Last updated: 2/3/2026, 7:55:53 PM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats