Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14347: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Proliz Software Ltd. OBS (Student Affairs Information System)0

0
Medium
VulnerabilityCVE-2025-14347cvecve-2025-14347cwe-79
Published: Wed Dec 17 2025 (12/17/2025, 08:12:07 UTC)
Source: CVE Database V5
Vendor/Project: Proliz Software Ltd.
Product: OBS (Student Affairs Information System)0

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Proliz Software Ltd. OBS (Student Affairs Information System)0 allows Reflected XSS.This issue affects OBS (Student Affairs Information System)0: before 26.5009.

AI-Powered Analysis

AILast updated: 12/17/2025, 08:34:32 UTC

Technical Analysis

CVE-2025-14347 identifies a reflected Cross-site Scripting (XSS) vulnerability in the OBS (Student Affairs Information System)0 product by Proliz Software Ltd., affecting versions prior to 26.5009. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Specifically, the application fails to adequately sanitize or encode user-supplied input before reflecting it in web pages, enabling attackers to inject malicious JavaScript code. This reflected XSS requires an attacker to craft a malicious URL or input that, when visited or submitted by a user, executes the injected script in the victim's browser context. The CVSS v3.1 base score is 6.3, with vector AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires low privileges, and user interaction is necessary. The impact is high on confidentiality, as attackers can steal session cookies, credentials, or other sensitive data accessible in the browser context, but the integrity impact is low and availability is unaffected. No public exploits are currently known, and no patches have been linked yet. The vulnerability primarily affects educational institutions using the OBS system for student affairs management, potentially exposing sensitive student data and administrative credentials.

Potential Impact

For European organizations, particularly educational institutions using the OBS Student Affairs Information System, this vulnerability poses a significant risk to the confidentiality of sensitive student and administrative data. Successful exploitation could lead to session hijacking, unauthorized access to personal information, and potential further compromise of internal systems if attackers leverage stolen credentials. Although the integrity and availability impacts are limited, the breach of confidentiality can have severe legal and reputational consequences under GDPR and other data protection regulations. The need for user interaction (e.g., clicking a malicious link) somewhat limits exploitation scope but does not eliminate risk, especially in environments where phishing or social engineering attacks are common. The vulnerability could also facilitate lateral movement within networks if attackers gain access to privileged accounts. Overall, the threat could disrupt normal operations of student affairs departments and erode trust in institutional data security.

Mitigation Recommendations

Organizations should prioritize deploying patches or updates from Proliz Software Ltd. once available. In the interim, implement strict input validation and output encoding on all user-supplied data to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct security awareness training to reduce the likelihood of users clicking on malicious links. Monitor web server logs and application behavior for unusual requests or error patterns indicative of attempted XSS exploitation. Consider deploying Web Application Firewalls (WAFs) with rules targeting XSS attack patterns specific to the OBS system. Regularly audit and review the application codebase for other potential injection points. Finally, ensure incident response plans include procedures for handling XSS incidents and data breaches involving student information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-12-09T14:54:46.686Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6942697da68039dadb6d7560

Added to database: 12/17/2025, 8:27:41 AM

Last enriched: 12/17/2025, 8:34:32 AM

Last updated: 12/17/2025, 10:32:59 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats