CVE-2025-14347: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Proliz Software Ltd. OBS (Student Affairs Information System)0
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Proliz Software Ltd. OBS (Student Affairs Information System)0 allows Reflected XSS.This issue affects OBS (Student Affairs Information System)0: before 26.5009.
AI Analysis
Technical Summary
CVE-2025-14347 identifies a reflected Cross-site Scripting (XSS) vulnerability in the OBS (Student Affairs Information System)0 product by Proliz Software Ltd., affecting versions prior to 26.5009. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Specifically, the application fails to adequately sanitize or encode user-supplied input before reflecting it in web pages, enabling attackers to inject malicious JavaScript code. This reflected XSS requires an attacker to craft a malicious URL or input that, when visited or submitted by a user, executes the injected script in the victim's browser context. The CVSS v3.1 base score is 6.3, with vector AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires low privileges, and user interaction is necessary. The impact is high on confidentiality, as attackers can steal session cookies, credentials, or other sensitive data accessible in the browser context, but the integrity impact is low and availability is unaffected. No public exploits are currently known, and no patches have been linked yet. The vulnerability primarily affects educational institutions using the OBS system for student affairs management, potentially exposing sensitive student data and administrative credentials.
Potential Impact
For European organizations, particularly educational institutions using the OBS Student Affairs Information System, this vulnerability poses a significant risk to the confidentiality of sensitive student and administrative data. Successful exploitation could lead to session hijacking, unauthorized access to personal information, and potential further compromise of internal systems if attackers leverage stolen credentials. Although the integrity and availability impacts are limited, the breach of confidentiality can have severe legal and reputational consequences under GDPR and other data protection regulations. The need for user interaction (e.g., clicking a malicious link) somewhat limits exploitation scope but does not eliminate risk, especially in environments where phishing or social engineering attacks are common. The vulnerability could also facilitate lateral movement within networks if attackers gain access to privileged accounts. Overall, the threat could disrupt normal operations of student affairs departments and erode trust in institutional data security.
Mitigation Recommendations
Organizations should prioritize deploying patches or updates from Proliz Software Ltd. once available. In the interim, implement strict input validation and output encoding on all user-supplied data to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct security awareness training to reduce the likelihood of users clicking on malicious links. Monitor web server logs and application behavior for unusual requests or error patterns indicative of attempted XSS exploitation. Consider deploying Web Application Firewalls (WAFs) with rules targeting XSS attack patterns specific to the OBS system. Regularly audit and review the application codebase for other potential injection points. Finally, ensure incident response plans include procedures for handling XSS incidents and data breaches involving student information.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14347: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Proliz Software Ltd. OBS (Student Affairs Information System)0
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Proliz Software Ltd. OBS (Student Affairs Information System)0 allows Reflected XSS.This issue affects OBS (Student Affairs Information System)0: before 26.5009.
AI-Powered Analysis
Technical Analysis
CVE-2025-14347 identifies a reflected Cross-site Scripting (XSS) vulnerability in the OBS (Student Affairs Information System)0 product by Proliz Software Ltd., affecting versions prior to 26.5009. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Specifically, the application fails to adequately sanitize or encode user-supplied input before reflecting it in web pages, enabling attackers to inject malicious JavaScript code. This reflected XSS requires an attacker to craft a malicious URL or input that, when visited or submitted by a user, executes the injected script in the victim's browser context. The CVSS v3.1 base score is 6.3, with vector AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires low privileges, and user interaction is necessary. The impact is high on confidentiality, as attackers can steal session cookies, credentials, or other sensitive data accessible in the browser context, but the integrity impact is low and availability is unaffected. No public exploits are currently known, and no patches have been linked yet. The vulnerability primarily affects educational institutions using the OBS system for student affairs management, potentially exposing sensitive student data and administrative credentials.
Potential Impact
For European organizations, particularly educational institutions using the OBS Student Affairs Information System, this vulnerability poses a significant risk to the confidentiality of sensitive student and administrative data. Successful exploitation could lead to session hijacking, unauthorized access to personal information, and potential further compromise of internal systems if attackers leverage stolen credentials. Although the integrity and availability impacts are limited, the breach of confidentiality can have severe legal and reputational consequences under GDPR and other data protection regulations. The need for user interaction (e.g., clicking a malicious link) somewhat limits exploitation scope but does not eliminate risk, especially in environments where phishing or social engineering attacks are common. The vulnerability could also facilitate lateral movement within networks if attackers gain access to privileged accounts. Overall, the threat could disrupt normal operations of student affairs departments and erode trust in institutional data security.
Mitigation Recommendations
Organizations should prioritize deploying patches or updates from Proliz Software Ltd. once available. In the interim, implement strict input validation and output encoding on all user-supplied data to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct security awareness training to reduce the likelihood of users clicking on malicious links. Monitor web server logs and application behavior for unusual requests or error patterns indicative of attempted XSS exploitation. Consider deploying Web Application Firewalls (WAFs) with rules targeting XSS attack patterns specific to the OBS system. Regularly audit and review the application codebase for other potential injection points. Finally, ensure incident response plans include procedures for handling XSS incidents and data breaches involving student information.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- TR-CERT
- Date Reserved
- 2025-12-09T14:54:46.686Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6942697da68039dadb6d7560
Added to database: 12/17/2025, 8:27:41 AM
Last enriched: 12/17/2025, 8:34:32 AM
Last updated: 12/17/2025, 10:32:59 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14101: CWE-639 Authorization Bypass Through User-Controlled Key in GG Soft Software Services Inc. PaperWork
HighAuto Parts Giant LKQ Confirms Oracle EBS Breach
MediumCVE-2025-14399: CWE-352 Cross-Site Request Forgery (CSRF) in wpcodefactory Download Plugins and Themes in ZIP from Dashboard
MediumCVE-2025-12496: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in dylanjkotze Zephyr Project Manager
MediumCVE-2025-14061: CWE-862 Missing Authorization in wplegalpages Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.