Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25949: n/a

0
Medium
VulnerabilityCVE-2025-25949cvecve-2025-25949
Published: Mon Mar 03 2025 (03/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored cross-site scripting (XSS) vulnerability in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the User ID parameter at /rest/staffResource/update.

AI-Powered Analysis

AILast updated: 12/12/2025, 15:36:35 UTC

Technical Analysis

CVE-2025-25949 identifies a stored cross-site scripting (XSS) vulnerability in the Academia Student Information System (SIS) EagleR version 1.0.118 developed by Serosoft Solutions Pvt Ltd. The vulnerability resides in the /rest/staffResource/update REST API endpoint, specifically in the handling of the User ID parameter. An attacker with limited privileges (PR:L) can inject crafted malicious scripts or HTML payloads that are stored persistently on the server. When other users or administrators access the affected resource, the injected script executes in their browsers, potentially allowing theft of session tokens, manipulation of displayed data, or execution of unauthorized actions within the web application context. The vulnerability requires user interaction (UI:R), such as an administrator or staff member viewing the compromised data, and affects confidentiality and integrity but not availability. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reflects network attack vector, low attack complexity, limited privileges required, user interaction needed, scope changed (impact beyond the vulnerable component), and partial loss of confidentiality and integrity. No patches or public exploits are currently available, but the vulnerability is published and should be addressed promptly. The CWE-79 classification confirms this is a classic stored XSS issue, typically arising from insufficient input sanitization and output encoding in web applications.

Potential Impact

For European organizations, particularly educational institutions using the Academia SIS EagleR system, this vulnerability poses a risk of unauthorized script execution within trusted user sessions. This can lead to theft of sensitive information such as authentication tokens, personal data of students and staff, and unauthorized actions performed on behalf of legitimate users. The impact on confidentiality and integrity could result in data breaches, reputational damage, and compliance violations under GDPR. Although availability is not affected, the compromise of user accounts or data integrity could disrupt administrative operations. Since the vulnerability requires limited privileges and user interaction, insider threats or social engineering could facilitate exploitation. The medium severity score indicates a moderate risk, but the strategic importance of educational data and privacy in Europe elevates the need for timely mitigation. Organizations with weak access controls or insufficient monitoring are more vulnerable to exploitation.

Mitigation Recommendations

To mitigate CVE-2025-25949, organizations should implement strict input validation and output encoding on the User ID parameter at the /rest/staffResource/update endpoint to prevent injection of malicious scripts. Employ a whitelist approach for allowed characters and sanitize inputs to remove or encode HTML and script tags. Review and harden access controls to ensure only authorized users with a legitimate need can access or modify staff resource data. Implement Content Security Policy (CSP) headers to restrict script execution sources in the web application. Conduct regular security testing, including automated scanning and manual code review focused on XSS vulnerabilities. Educate staff and administrators about phishing and social engineering risks that could facilitate exploitation. Monitor logs for unusual activity related to the affected endpoint. If available, apply vendor patches promptly once released. As no patch is currently available, consider temporary compensating controls such as web application firewalls (WAF) with rules to detect and block XSS payloads targeting this endpoint.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693c347d2e981ee9614b5ba5

Added to database: 12/12/2025, 3:27:57 PM

Last enriched: 12/12/2025, 3:36:35 PM

Last updated: 12/14/2025, 6:00:45 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats