CVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14201 is a cross-site scripting (XSS) vulnerability identified in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php application, affecting versions up to commit 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. The vulnerability exists in the /dishsub.php file, where the item.name parameter is not properly sanitized or encoded before being reflected in the web page output. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim's browser when they interact with the vulnerable functionality. The attack vector is remote, requiring no authentication but does require user interaction (e.g., clicking a crafted link or submitting a form). The CVSS 4.0 score is 4.8 (medium severity), reflecting the limited impact on confidentiality and integrity, and the requirement for user interaction and high privileges. The vendor uses a rolling release model, complicating version tracking and patch availability. The vendor was contacted but did not respond or provide a fix. No known exploits are currently active in the wild, but public disclosure increases the risk of exploitation. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or deface the application interface, impacting the confidentiality and integrity of user data and the availability of services.
Potential Impact
For European organizations using the alokjaiswal Hotel-Management-services-using-MYSQL-and-php platform, this XSS vulnerability poses risks including session hijacking, unauthorized actions performed on behalf of authenticated users, and potential exposure of sensitive customer data. Given the hospitality industry's reliance on customer trust and data privacy, exploitation could lead to reputational damage, regulatory penalties under GDPR, and financial losses. Although the vulnerability requires user interaction and high privileges, social engineering or insider threats could facilitate exploitation. The lack of vendor response and patch availability increases exposure duration. Additionally, attackers could use this vulnerability as a foothold to conduct further attacks within the network. The impact on availability is minimal but the integrity and confidentiality of user sessions and data are at risk. Organizations with online booking or management portals are particularly vulnerable, as attackers could manipulate customer interactions or inject malicious content affecting end-users.
Mitigation Recommendations
Organizations should implement strict input validation and output encoding on the item.name parameter within /dishsub.php to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. Conduct thorough code reviews and penetration testing focusing on user input handling in all web application components. Monitor web server logs and application behavior for unusual requests or script injections. If possible, isolate the vulnerable service behind web application firewalls (WAFs) configured to detect and block XSS payloads. Educate users and staff about phishing and social engineering risks that could facilitate exploitation. Since no official patch is available, consider temporary mitigations such as disabling or restricting access to the vulnerable functionality until a fix is released. Maintain regular backups and incident response plans tailored to web application attacks. Engage with the vendor or community to track updates or unofficial patches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php
Description
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14201 is a cross-site scripting (XSS) vulnerability identified in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php application, affecting versions up to commit 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. The vulnerability exists in the /dishsub.php file, where the item.name parameter is not properly sanitized or encoded before being reflected in the web page output. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim's browser when they interact with the vulnerable functionality. The attack vector is remote, requiring no authentication but does require user interaction (e.g., clicking a crafted link or submitting a form). The CVSS 4.0 score is 4.8 (medium severity), reflecting the limited impact on confidentiality and integrity, and the requirement for user interaction and high privileges. The vendor uses a rolling release model, complicating version tracking and patch availability. The vendor was contacted but did not respond or provide a fix. No known exploits are currently active in the wild, but public disclosure increases the risk of exploitation. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or deface the application interface, impacting the confidentiality and integrity of user data and the availability of services.
Potential Impact
For European organizations using the alokjaiswal Hotel-Management-services-using-MYSQL-and-php platform, this XSS vulnerability poses risks including session hijacking, unauthorized actions performed on behalf of authenticated users, and potential exposure of sensitive customer data. Given the hospitality industry's reliance on customer trust and data privacy, exploitation could lead to reputational damage, regulatory penalties under GDPR, and financial losses. Although the vulnerability requires user interaction and high privileges, social engineering or insider threats could facilitate exploitation. The lack of vendor response and patch availability increases exposure duration. Additionally, attackers could use this vulnerability as a foothold to conduct further attacks within the network. The impact on availability is minimal but the integrity and confidentiality of user sessions and data are at risk. Organizations with online booking or management portals are particularly vulnerable, as attackers could manipulate customer interactions or inject malicious content affecting end-users.
Mitigation Recommendations
Organizations should implement strict input validation and output encoding on the item.name parameter within /dishsub.php to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. Conduct thorough code reviews and penetration testing focusing on user input handling in all web application components. Monitor web server logs and application behavior for unusual requests or script injections. If possible, isolate the vulnerable service behind web application firewalls (WAFs) configured to detect and block XSS payloads. Educate users and staff about phishing and social engineering risks that could facilitate exploitation. Since no official patch is available, consider temporary mitigations such as disabling or restricting access to the vulnerable functionality until a fix is released. Maintain regular backups and incident response plans tailored to web application attacks. Engage with the vendor or community to track updates or unofficial patches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T17:38:30.134Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6935c6fc81c8736e4c1ad8b3
Added to database: 12/7/2025, 6:27:08 PM
Last enriched: 12/7/2025, 6:42:00 PM
Last updated: 12/8/2025, 1:00:11 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
MediumCVE-2025-14245: SQL Injection in IdeaCMS
MediumCVE-2025-42615: CWE-307 Improper Restriction of Excessive Authentication Attempts in CIRCL Vulnerability-Lookup
HighCVE-2025-14244: Cross Site Scripting in GreenCMS
MediumCVE-2025-42620: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in CIRCL Vulnerability-Lookup
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.