Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php

0
Medium
VulnerabilityCVE-2025-14201cvecve-2025-14201
Published: Sun Dec 07 2025 (12/07/2025, 18:02:05 UTC)
Source: CVE Database V5
Vendor/Project: alokjaiswal
Product: Hotel-Management-services-using-MYSQL-and-php

Description

A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/07/2025, 18:42:00 UTC

Technical Analysis

CVE-2025-14201 is a cross-site scripting (XSS) vulnerability identified in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php application, affecting versions up to commit 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. The vulnerability exists in the /dishsub.php file, where the item.name parameter is not properly sanitized or encoded before being reflected in the web page output. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim's browser when they interact with the vulnerable functionality. The attack vector is remote, requiring no authentication but does require user interaction (e.g., clicking a crafted link or submitting a form). The CVSS 4.0 score is 4.8 (medium severity), reflecting the limited impact on confidentiality and integrity, and the requirement for user interaction and high privileges. The vendor uses a rolling release model, complicating version tracking and patch availability. The vendor was contacted but did not respond or provide a fix. No known exploits are currently active in the wild, but public disclosure increases the risk of exploitation. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or deface the application interface, impacting the confidentiality and integrity of user data and the availability of services.

Potential Impact

For European organizations using the alokjaiswal Hotel-Management-services-using-MYSQL-and-php platform, this XSS vulnerability poses risks including session hijacking, unauthorized actions performed on behalf of authenticated users, and potential exposure of sensitive customer data. Given the hospitality industry's reliance on customer trust and data privacy, exploitation could lead to reputational damage, regulatory penalties under GDPR, and financial losses. Although the vulnerability requires user interaction and high privileges, social engineering or insider threats could facilitate exploitation. The lack of vendor response and patch availability increases exposure duration. Additionally, attackers could use this vulnerability as a foothold to conduct further attacks within the network. The impact on availability is minimal but the integrity and confidentiality of user sessions and data are at risk. Organizations with online booking or management portals are particularly vulnerable, as attackers could manipulate customer interactions or inject malicious content affecting end-users.

Mitigation Recommendations

Organizations should implement strict input validation and output encoding on the item.name parameter within /dishsub.php to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. Conduct thorough code reviews and penetration testing focusing on user input handling in all web application components. Monitor web server logs and application behavior for unusual requests or script injections. If possible, isolate the vulnerable service behind web application firewalls (WAFs) configured to detect and block XSS payloads. Educate users and staff about phishing and social engineering risks that could facilitate exploitation. Since no official patch is available, consider temporary mitigations such as disabling or restricting access to the vulnerable functionality until a fix is released. Maintain regular backups and incident response plans tailored to web application attacks. Engage with the vendor or community to track updates or unofficial patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T17:38:30.134Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6935c6fc81c8736e4c1ad8b3

Added to database: 12/7/2025, 6:27:08 PM

Last enriched: 12/7/2025, 6:42:00 PM

Last updated: 12/8/2025, 1:00:11 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats