CVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14201 is a cross-site scripting vulnerability identified in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php application, affecting versions up to commit 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. The vulnerability exists in the /dishsub.php file where the item.name parameter is not properly sanitized, allowing attackers to inject malicious JavaScript code. This can be exploited remotely without authentication but requires user interaction to trigger the malicious payload. The vulnerability could enable attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, compromising user confidentiality and integrity. The product uses a rolling release model, so specific versioning details for patched releases are unavailable, and the vendor has not responded to vulnerability reports or provided fixes. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the vector states PR:H which conflicts with the description; assuming the CVSS vector is correct, some privileges are needed), user interaction required (UI:P), and low impact on confidentiality and integrity. No known exploits are currently active in the wild, but public exploit code exists, increasing the risk of exploitation. The vulnerability is categorized as medium severity due to its moderate impact and exploitation requirements.
Potential Impact
The primary impact of this vulnerability is the potential compromise of user confidentiality and integrity through cross-site scripting attacks. Attackers can inject malicious scripts that execute in the context of the victim's browser, potentially stealing session cookies, credentials, or performing unauthorized actions on behalf of the user. This can lead to account takeover, data leakage, or phishing attacks targeting users of the hotel management system. Although availability is not directly affected, successful exploitation can degrade user trust and system reputation. Organizations relying on this software for managing hotel operations may face operational disruptions, reputational damage, and regulatory compliance issues if customer data is compromised. The risk is heightened by the lack of vendor response and absence of official patches, leaving many deployments potentially exposed. The medium CVSS score reflects moderate ease of exploitation combined with limited impact scope, but the presence of public exploit code increases the likelihood of opportunistic attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the item.name parameter within /dishsub.php to prevent injection of malicious scripts. Employing a web application firewall (WAF) with rules targeting XSS payloads can provide an additional layer of defense. Since no official patches are available, consider isolating the affected application from critical network segments and restricting access to trusted users only. Conduct regular security assessments and penetration tests to identify similar injection points. Educate users about the risks of clicking suspicious links or executing unexpected scripts. If possible, migrate to alternative hotel management solutions with active security maintenance. Monitor public vulnerability databases and vendor communications for any future patches or updates. Implement Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the sources of executable scripts. Finally, maintain comprehensive logging and alerting to detect potential exploitation attempts.
Affected Countries
United States, India, United Kingdom, Germany, France, Australia, Canada, United Arab Emirates, Singapore, Japan
CVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
Description
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14201 is a cross-site scripting vulnerability identified in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php application, affecting versions up to commit 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. The vulnerability exists in the /dishsub.php file where the item.name parameter is not properly sanitized, allowing attackers to inject malicious JavaScript code. This can be exploited remotely without authentication but requires user interaction to trigger the malicious payload. The vulnerability could enable attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, compromising user confidentiality and integrity. The product uses a rolling release model, so specific versioning details for patched releases are unavailable, and the vendor has not responded to vulnerability reports or provided fixes. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the vector states PR:H which conflicts with the description; assuming the CVSS vector is correct, some privileges are needed), user interaction required (UI:P), and low impact on confidentiality and integrity. No known exploits are currently active in the wild, but public exploit code exists, increasing the risk of exploitation. The vulnerability is categorized as medium severity due to its moderate impact and exploitation requirements.
Potential Impact
The primary impact of this vulnerability is the potential compromise of user confidentiality and integrity through cross-site scripting attacks. Attackers can inject malicious scripts that execute in the context of the victim's browser, potentially stealing session cookies, credentials, or performing unauthorized actions on behalf of the user. This can lead to account takeover, data leakage, or phishing attacks targeting users of the hotel management system. Although availability is not directly affected, successful exploitation can degrade user trust and system reputation. Organizations relying on this software for managing hotel operations may face operational disruptions, reputational damage, and regulatory compliance issues if customer data is compromised. The risk is heightened by the lack of vendor response and absence of official patches, leaving many deployments potentially exposed. The medium CVSS score reflects moderate ease of exploitation combined with limited impact scope, but the presence of public exploit code increases the likelihood of opportunistic attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the item.name parameter within /dishsub.php to prevent injection of malicious scripts. Employing a web application firewall (WAF) with rules targeting XSS payloads can provide an additional layer of defense. Since no official patches are available, consider isolating the affected application from critical network segments and restricting access to trusted users only. Conduct regular security assessments and penetration tests to identify similar injection points. Educate users about the risks of clicking suspicious links or executing unexpected scripts. If possible, migrate to alternative hotel management solutions with active security maintenance. Monitor public vulnerability databases and vendor communications for any future patches or updates. Implement Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the sources of executable scripts. Finally, maintain comprehensive logging and alerting to detect potential exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T17:38:30.134Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6935c6fc81c8736e4c1ad8b3
Added to database: 12/7/2025, 6:27:08 PM
Last enriched: 2/24/2026, 10:51:51 PM
Last updated: 3/25/2026, 1:33:40 AM
Views: 228
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.