Skip to main content

CVE-2025-29568: n/a in n/a

Medium
VulnerabilityCVE-2025-29568cvecve-2025-29568n-acwe-79
Published: Thu Apr 24 2025 (04/24/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A vulnerability has been discovered in the code-projects Online Class and Exam Scheduling System 1.0. The issue affects some unknown features in the file /Scheduling/pages/class_sched.php. Manipulating the class parameter can lead to cross-site scripting (XSS).

AI-Powered Analysis

AILast updated: 06/24/2025, 05:40:57 UTC

Technical Analysis

CVE-2025-29568 is a medium-severity vulnerability identified in the code-projects Online Class and Exam Scheduling System version 1.0. The vulnerability resides in the /Scheduling/pages/class_sched.php file, specifically involving the manipulation of the 'class' parameter. This flaw allows an attacker to perform a Cross-Site Scripting (XSS) attack, classified under CWE-79. The vulnerability arises because user-supplied input in the 'class' parameter is not properly sanitized or encoded before being reflected in the web page output, enabling injection of malicious scripts. According to the CVSS 3.1 vector (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N), exploitation requires network access, low attack complexity, and high privileges, with user interaction needed. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. The impact includes limited confidentiality and integrity loss, with no impact on availability. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability was reserved in March 2025 and published in April 2025. The affected product is an online scheduling system used for managing classes and exams, likely deployed in educational institutions or training organizations. The vulnerability could be exploited by authenticated users who can manipulate the 'class' parameter, potentially tricking other users into executing malicious scripts within their browsers, leading to session hijacking, credential theft, or unauthorized actions within the scheduling system context.

Potential Impact

For European organizations, particularly educational institutions and training providers using the affected Online Class and Exam Scheduling System, this vulnerability poses a risk of targeted XSS attacks. Successful exploitation could lead to theft of user credentials, session tokens, or unauthorized actions performed on behalf of legitimate users, undermining the integrity of scheduling data and potentially exposing sensitive academic information. Although the confidentiality and integrity impacts are limited, the scope change indicates that the vulnerability could affect multiple components or users, increasing the risk of lateral impact within the system. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate the threat, especially in environments with many authenticated users. Additionally, compromised accounts could be leveraged for further attacks within the institution’s network. Given the increasing reliance on digital platforms for education in Europe, disruption or data compromise in such systems could affect operational continuity and trust. The lack of known exploits currently limits immediate risk, but the absence of patches necessitates proactive measures.

Mitigation Recommendations

1. Implement strict input validation and output encoding on the 'class' parameter to neutralize malicious scripts, following OWASP XSS prevention guidelines. 2. Apply Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the scheduling system’s web pages. 3. Enforce the principle of least privilege by limiting user permissions to only necessary functions within the scheduling system, reducing the impact of compromised accounts. 4. Conduct regular security awareness training for users to recognize and avoid phishing or social engineering attempts that could facilitate exploitation. 5. Monitor web application logs for unusual parameter values or repeated attempts to inject scripts. 6. If possible, isolate the scheduling system within a segmented network zone to limit lateral movement in case of compromise. 7. Engage with the vendor or development team to prioritize the release of a patch or update addressing this vulnerability. 8. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block malicious payloads targeting the 'class' parameter until an official fix is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf0f96

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 5:40:57 AM

Last updated: 7/31/2025, 1:58:09 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats