CVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
CVE-2025-14201 is a medium severity cross-site scripting (XSS) vulnerability in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php product, specifically in the /dishsub. php file via the item. name parameter. The vulnerability allows remote attackers to inject malicious scripts without requiring authentication but does require user interaction. Exploitation could lead to limited integrity impact and potential user session compromise. The vendor has not responded to disclosure requests, and no patches are currently available. This vulnerability affects a niche hotel management system that may be used by small to medium hospitality businesses. European organizations using this software should prioritize input validation and consider compensating controls. Countries with significant hospitality sectors and adoption of PHP-based management tools are more likely impacted. The CVSS 4.
AI Analysis
Technical Summary
CVE-2025-14201 is a cross-site scripting (XSS) vulnerability identified in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php software, specifically within the /dishsub.php file. The flaw arises from improper sanitization of the item.name parameter, allowing an attacker to inject malicious JavaScript code remotely. This vulnerability does not require authentication but does require user interaction to trigger the payload, such as a user clicking a crafted link or viewing a manipulated page. The impact primarily affects the integrity of user sessions and potentially the confidentiality of user data if session cookies or tokens are stolen via the injected script. The vulnerability has a CVSS 4.8 score, indicating a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, but user interaction needed. The vendor uses a rolling release model, complicating version tracking and patch availability, and has not responded to disclosure attempts, leaving the vulnerability unpatched. No known exploits are currently active in the wild, but public proof-of-concept code exists, increasing the risk of exploitation. The affected product is a PHP and MySQL-based hotel management system, likely used by small to medium hospitality businesses for managing bookings, menus, and services. The vulnerability could be exploited to conduct phishing, session hijacking, or defacement attacks within the affected application context.
Potential Impact
For European organizations, the impact of CVE-2025-14201 depends on the extent of adoption of the alokjaiswal Hotel-Management-services-using-MYSQL-and-php software. Hospitality businesses using this system could face risks of session hijacking, user impersonation, or defacement, potentially leading to loss of customer trust and reputational damage. Although the vulnerability does not directly compromise backend databases or server integrity, the injected scripts could be used to steal user credentials or manipulate user interactions, indirectly affecting confidentiality and integrity. Given the hospitality sector's importance in Europe, especially in countries with large tourism industries, exploitation could disrupt business operations and customer relations. The lack of vendor response and patch availability increases exposure time. However, the medium severity and requirement for user interaction limit the scale of automated mass exploitation. Organizations with strict data protection regulations (e.g., GDPR) must consider the risk of personal data exposure through session hijacking or phishing facilitated by this XSS flaw.
Mitigation Recommendations
European organizations using this software should implement immediate input validation and output encoding on the item.name parameter within /dishsub.php to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Monitor web application logs for unusual input patterns or repeated attempts to exploit the vulnerability. Isolate the affected application environment from critical internal networks to limit lateral movement if exploitation occurs. Educate users about phishing risks and suspicious links, as user interaction is required for exploitation. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this parameter. Since no official patch is available, organizations should engage with the vendor for updates or consider migrating to alternative, actively maintained hotel management solutions. Regularly review and update incident response plans to address potential XSS incidents.
Affected Countries
France, Spain, Italy, Germany, United Kingdom, Netherlands, Portugal, Greece
CVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
Description
CVE-2025-14201 is a medium severity cross-site scripting (XSS) vulnerability in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php product, specifically in the /dishsub. php file via the item. name parameter. The vulnerability allows remote attackers to inject malicious scripts without requiring authentication but does require user interaction. Exploitation could lead to limited integrity impact and potential user session compromise. The vendor has not responded to disclosure requests, and no patches are currently available. This vulnerability affects a niche hotel management system that may be used by small to medium hospitality businesses. European organizations using this software should prioritize input validation and consider compensating controls. Countries with significant hospitality sectors and adoption of PHP-based management tools are more likely impacted. The CVSS 4.
AI-Powered Analysis
Technical Analysis
CVE-2025-14201 is a cross-site scripting (XSS) vulnerability identified in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php software, specifically within the /dishsub.php file. The flaw arises from improper sanitization of the item.name parameter, allowing an attacker to inject malicious JavaScript code remotely. This vulnerability does not require authentication but does require user interaction to trigger the payload, such as a user clicking a crafted link or viewing a manipulated page. The impact primarily affects the integrity of user sessions and potentially the confidentiality of user data if session cookies or tokens are stolen via the injected script. The vulnerability has a CVSS 4.8 score, indicating a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, but user interaction needed. The vendor uses a rolling release model, complicating version tracking and patch availability, and has not responded to disclosure attempts, leaving the vulnerability unpatched. No known exploits are currently active in the wild, but public proof-of-concept code exists, increasing the risk of exploitation. The affected product is a PHP and MySQL-based hotel management system, likely used by small to medium hospitality businesses for managing bookings, menus, and services. The vulnerability could be exploited to conduct phishing, session hijacking, or defacement attacks within the affected application context.
Potential Impact
For European organizations, the impact of CVE-2025-14201 depends on the extent of adoption of the alokjaiswal Hotel-Management-services-using-MYSQL-and-php software. Hospitality businesses using this system could face risks of session hijacking, user impersonation, or defacement, potentially leading to loss of customer trust and reputational damage. Although the vulnerability does not directly compromise backend databases or server integrity, the injected scripts could be used to steal user credentials or manipulate user interactions, indirectly affecting confidentiality and integrity. Given the hospitality sector's importance in Europe, especially in countries with large tourism industries, exploitation could disrupt business operations and customer relations. The lack of vendor response and patch availability increases exposure time. However, the medium severity and requirement for user interaction limit the scale of automated mass exploitation. Organizations with strict data protection regulations (e.g., GDPR) must consider the risk of personal data exposure through session hijacking or phishing facilitated by this XSS flaw.
Mitigation Recommendations
European organizations using this software should implement immediate input validation and output encoding on the item.name parameter within /dishsub.php to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Monitor web application logs for unusual input patterns or repeated attempts to exploit the vulnerability. Isolate the affected application environment from critical internal networks to limit lateral movement if exploitation occurs. Educate users about phishing risks and suspicious links, as user interaction is required for exploitation. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this parameter. Since no official patch is available, organizations should engage with the vendor for updates or consider migrating to alternative, actively maintained hotel management solutions. Regularly review and update incident response plans to address potential XSS incidents.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T17:38:30.134Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6935c6fc81c8736e4c1ad8b3
Added to database: 12/7/2025, 6:27:08 PM
Last enriched: 12/15/2025, 4:58:58 AM
Last updated: 2/5/2026, 8:26:01 AM
Views: 192
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25575: CWE-23: Relative Path Traversal in TUM-Dev NavigaTUM
HighCVE-2025-10258: Vulnerability in Nokia Infinera DNA
UnknownCVE-2026-1268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brechtvds Dynamic Widget Content
MediumCVE-2026-1246: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in shortpixel ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF
MediumCVE-2026-0867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in catchthemes Essential Widgets
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.