Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14201: Cross Site Scripting in alokjaiswal Hotel-Management-services-using-MYSQL-and-php

0
Medium
VulnerabilityCVE-2025-14201cvecve-2025-14201
Published: Sun Dec 07 2025 (12/07/2025, 18:02:05 UTC)
Source: CVE Database V5
Vendor/Project: alokjaiswal
Product: Hotel-Management-services-using-MYSQL-and-php

Description

A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:51:51 UTC

Technical Analysis

CVE-2025-14201 is a cross-site scripting vulnerability identified in the alokjaiswal Hotel-Management-services-using-MYSQL-and-php application, affecting versions up to commit 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. The vulnerability exists in the /dishsub.php file where the item.name parameter is not properly sanitized, allowing attackers to inject malicious JavaScript code. This can be exploited remotely without authentication but requires user interaction to trigger the malicious payload. The vulnerability could enable attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, compromising user confidentiality and integrity. The product uses a rolling release model, so specific versioning details for patched releases are unavailable, and the vendor has not responded to vulnerability reports or provided fixes. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the vector states PR:H which conflicts with the description; assuming the CVSS vector is correct, some privileges are needed), user interaction required (UI:P), and low impact on confidentiality and integrity. No known exploits are currently active in the wild, but public exploit code exists, increasing the risk of exploitation. The vulnerability is categorized as medium severity due to its moderate impact and exploitation requirements.

Potential Impact

The primary impact of this vulnerability is the potential compromise of user confidentiality and integrity through cross-site scripting attacks. Attackers can inject malicious scripts that execute in the context of the victim's browser, potentially stealing session cookies, credentials, or performing unauthorized actions on behalf of the user. This can lead to account takeover, data leakage, or phishing attacks targeting users of the hotel management system. Although availability is not directly affected, successful exploitation can degrade user trust and system reputation. Organizations relying on this software for managing hotel operations may face operational disruptions, reputational damage, and regulatory compliance issues if customer data is compromised. The risk is heightened by the lack of vendor response and absence of official patches, leaving many deployments potentially exposed. The medium CVSS score reflects moderate ease of exploitation combined with limited impact scope, but the presence of public exploit code increases the likelihood of opportunistic attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the item.name parameter within /dishsub.php to prevent injection of malicious scripts. Employing a web application firewall (WAF) with rules targeting XSS payloads can provide an additional layer of defense. Since no official patches are available, consider isolating the affected application from critical network segments and restricting access to trusted users only. Conduct regular security assessments and penetration tests to identify similar injection points. Educate users about the risks of clicking suspicious links or executing unexpected scripts. If possible, migrate to alternative hotel management solutions with active security maintenance. Monitor public vulnerability databases and vendor communications for any future patches or updates. Implement Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the sources of executable scripts. Finally, maintain comprehensive logging and alerting to detect potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T17:38:30.134Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6935c6fc81c8736e4c1ad8b3

Added to database: 12/7/2025, 6:27:08 PM

Last enriched: 2/24/2026, 10:51:51 PM

Last updated: 3/24/2026, 12:44:00 AM

Views: 227

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses