CVE-2025-25949: n/a
A stored cross-site scripting (XSS) vulnerability in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the User ID parameter at /rest/staffResource/update.
AI Analysis
Technical Summary
CVE-2025-25949 identifies a stored cross-site scripting (XSS) vulnerability in the Academia Student Information System (SIS) EagleR version 1.0.118 developed by Serosoft Solutions Pvt Ltd. The vulnerability resides in the /rest/staffResource/update REST API endpoint, specifically in the handling of the User ID parameter. An attacker with limited privileges (PR:L) can inject crafted malicious scripts or HTML payloads that are stored persistently on the server. When other users or administrators access the affected resource, the injected script executes in their browsers, potentially allowing theft of session tokens, manipulation of displayed data, or execution of unauthorized actions within the web application context. The vulnerability requires user interaction (UI:R), such as an administrator or staff member viewing the compromised data, and affects confidentiality and integrity but not availability. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reflects network attack vector, low attack complexity, limited privileges required, user interaction needed, scope changed (impact beyond the vulnerable component), and partial loss of confidentiality and integrity. No patches or public exploits are currently available, but the vulnerability is published and should be addressed promptly. The CWE-79 classification confirms this is a classic stored XSS issue, typically arising from insufficient input sanitization and output encoding in web applications.
Potential Impact
For European organizations, particularly educational institutions using the Academia SIS EagleR system, this vulnerability poses a risk of unauthorized script execution within trusted user sessions. This can lead to theft of sensitive information such as authentication tokens, personal data of students and staff, and unauthorized actions performed on behalf of legitimate users. The impact on confidentiality and integrity could result in data breaches, reputational damage, and compliance violations under GDPR. Although availability is not affected, the compromise of user accounts or data integrity could disrupt administrative operations. Since the vulnerability requires limited privileges and user interaction, insider threats or social engineering could facilitate exploitation. The medium severity score indicates a moderate risk, but the strategic importance of educational data and privacy in Europe elevates the need for timely mitigation. Organizations with weak access controls or insufficient monitoring are more vulnerable to exploitation.
Mitigation Recommendations
To mitigate CVE-2025-25949, organizations should implement strict input validation and output encoding on the User ID parameter at the /rest/staffResource/update endpoint to prevent injection of malicious scripts. Employ a whitelist approach for allowed characters and sanitize inputs to remove or encode HTML and script tags. Review and harden access controls to ensure only authorized users with a legitimate need can access or modify staff resource data. Implement Content Security Policy (CSP) headers to restrict script execution sources in the web application. Conduct regular security testing, including automated scanning and manual code review focused on XSS vulnerabilities. Educate staff and administrators about phishing and social engineering risks that could facilitate exploitation. Monitor logs for unusual activity related to the affected endpoint. If available, apply vendor patches promptly once released. As no patch is currently available, consider temporary compensating controls such as web application firewalls (WAF) with rules to detect and block XSS payloads targeting this endpoint.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-25949: n/a
Description
A stored cross-site scripting (XSS) vulnerability in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the User ID parameter at /rest/staffResource/update.
AI-Powered Analysis
Technical Analysis
CVE-2025-25949 identifies a stored cross-site scripting (XSS) vulnerability in the Academia Student Information System (SIS) EagleR version 1.0.118 developed by Serosoft Solutions Pvt Ltd. The vulnerability resides in the /rest/staffResource/update REST API endpoint, specifically in the handling of the User ID parameter. An attacker with limited privileges (PR:L) can inject crafted malicious scripts or HTML payloads that are stored persistently on the server. When other users or administrators access the affected resource, the injected script executes in their browsers, potentially allowing theft of session tokens, manipulation of displayed data, or execution of unauthorized actions within the web application context. The vulnerability requires user interaction (UI:R), such as an administrator or staff member viewing the compromised data, and affects confidentiality and integrity but not availability. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reflects network attack vector, low attack complexity, limited privileges required, user interaction needed, scope changed (impact beyond the vulnerable component), and partial loss of confidentiality and integrity. No patches or public exploits are currently available, but the vulnerability is published and should be addressed promptly. The CWE-79 classification confirms this is a classic stored XSS issue, typically arising from insufficient input sanitization and output encoding in web applications.
Potential Impact
For European organizations, particularly educational institutions using the Academia SIS EagleR system, this vulnerability poses a risk of unauthorized script execution within trusted user sessions. This can lead to theft of sensitive information such as authentication tokens, personal data of students and staff, and unauthorized actions performed on behalf of legitimate users. The impact on confidentiality and integrity could result in data breaches, reputational damage, and compliance violations under GDPR. Although availability is not affected, the compromise of user accounts or data integrity could disrupt administrative operations. Since the vulnerability requires limited privileges and user interaction, insider threats or social engineering could facilitate exploitation. The medium severity score indicates a moderate risk, but the strategic importance of educational data and privacy in Europe elevates the need for timely mitigation. Organizations with weak access controls or insufficient monitoring are more vulnerable to exploitation.
Mitigation Recommendations
To mitigate CVE-2025-25949, organizations should implement strict input validation and output encoding on the User ID parameter at the /rest/staffResource/update endpoint to prevent injection of malicious scripts. Employ a whitelist approach for allowed characters and sanitize inputs to remove or encode HTML and script tags. Review and harden access controls to ensure only authorized users with a legitimate need can access or modify staff resource data. Implement Content Security Policy (CSP) headers to restrict script execution sources in the web application. Conduct regular security testing, including automated scanning and manual code review focused on XSS vulnerabilities. Educate staff and administrators about phishing and social engineering risks that could facilitate exploitation. Monitor logs for unusual activity related to the affected endpoint. If available, apply vendor patches promptly once released. As no patch is currently available, consider temporary compensating controls such as web application firewalls (WAF) with rules to detect and block XSS payloads targeting this endpoint.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-02-07T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693c347d2e981ee9614b5ba5
Added to database: 12/12/2025, 3:27:57 PM
Last enriched: 12/12/2025, 3:36:35 PM
Last updated: 12/14/2025, 6:00:45 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14673: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14668: SQL Injection in campcodes Advanced Online Examination System
MediumCVE-2025-14667: SQL Injection in itsourcecode COVID Tracking System
MediumWireshark 4.6.2 Released, (Sun, Dec 14th)
MediumCVE-2025-14666: SQL Injection in itsourcecode COVID Tracking System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.