Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php

0
Medium
VulnerabilityCVE-2025-14201cvecve-2025-14201
Published: Sun Dec 07 2025 (12/07/2025, 18:02:05 UTC)
Source: CVE Database V5
Vendor/Project: alokjaiswal
Product: Hotel-Management-services-using-MYSQL-and-php

Description

CVE-2025-14201 is a medium severity cross-site scripting (XSS) vulnerability in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php product, specifically in the /dishsub. php file via the item. name parameter. The vulnerability allows remote attackers to inject malicious scripts without requiring authentication but does require user interaction. Exploitation could lead to limited integrity impact and potential user session compromise. The vendor has not responded to disclosure requests, and no patches are currently available. This vulnerability affects a niche hotel management system that may be used by small to medium hospitality businesses. European organizations using this software should prioritize input validation and consider compensating controls. Countries with significant hospitality sectors and adoption of PHP-based management tools are more likely impacted. The CVSS 4.

AI-Powered Analysis

AILast updated: 12/15/2025, 04:58:58 UTC

Technical Analysis

CVE-2025-14201 is a cross-site scripting (XSS) vulnerability identified in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php software, specifically within the /dishsub.php file. The flaw arises from improper sanitization of the item.name parameter, allowing an attacker to inject malicious JavaScript code remotely. This vulnerability does not require authentication but does require user interaction to trigger the payload, such as a user clicking a crafted link or viewing a manipulated page. The impact primarily affects the integrity of user sessions and potentially the confidentiality of user data if session cookies or tokens are stolen via the injected script. The vulnerability has a CVSS 4.8 score, indicating a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, but user interaction needed. The vendor uses a rolling release model, complicating version tracking and patch availability, and has not responded to disclosure attempts, leaving the vulnerability unpatched. No known exploits are currently active in the wild, but public proof-of-concept code exists, increasing the risk of exploitation. The affected product is a PHP and MySQL-based hotel management system, likely used by small to medium hospitality businesses for managing bookings, menus, and services. The vulnerability could be exploited to conduct phishing, session hijacking, or defacement attacks within the affected application context.

Potential Impact

For European organizations, the impact of CVE-2025-14201 depends on the extent of adoption of the alokjaiswal Hotel-Management-services-using-MYSQL-and-php software. Hospitality businesses using this system could face risks of session hijacking, user impersonation, or defacement, potentially leading to loss of customer trust and reputational damage. Although the vulnerability does not directly compromise backend databases or server integrity, the injected scripts could be used to steal user credentials or manipulate user interactions, indirectly affecting confidentiality and integrity. Given the hospitality sector's importance in Europe, especially in countries with large tourism industries, exploitation could disrupt business operations and customer relations. The lack of vendor response and patch availability increases exposure time. However, the medium severity and requirement for user interaction limit the scale of automated mass exploitation. Organizations with strict data protection regulations (e.g., GDPR) must consider the risk of personal data exposure through session hijacking or phishing facilitated by this XSS flaw.

Mitigation Recommendations

European organizations using this software should implement immediate input validation and output encoding on the item.name parameter within /dishsub.php to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Monitor web application logs for unusual input patterns or repeated attempts to exploit the vulnerability. Isolate the affected application environment from critical internal networks to limit lateral movement if exploitation occurs. Educate users about phishing risks and suspicious links, as user interaction is required for exploitation. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this parameter. Since no official patch is available, organizations should engage with the vendor for updates or consider migrating to alternative, actively maintained hotel management solutions. Regularly review and update incident response plans to address potential XSS incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T17:38:30.134Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6935c6fc81c8736e4c1ad8b3

Added to database: 12/7/2025, 6:27:08 PM

Last enriched: 12/15/2025, 4:58:58 AM

Last updated: 2/5/2026, 8:26:01 AM

Views: 192

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats