CVE-2025-4470: Cross Site Scripting in SourceCodester Online Student Clearance System
A vulnerability classified as problematic was found in SourceCodester Online Student Clearance System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/add-student.php. The manipulation of the argument Fullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
AI Analysis
Technical Summary
CVE-2025-4470 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Online Student Clearance System, specifically within the /admin/add-student.php file. The vulnerability arises from improper sanitization or validation of the 'Fullname' parameter, which allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without authentication, although it requires user interaction to trigger the malicious script. The disclosed exploit targets the administrative interface, potentially allowing attackers to execute arbitrary JavaScript code when an administrator or authorized user accesses the affected functionality. The vulnerability is classified as medium severity with a CVSS 4.0 score of 4.8, reflecting moderate impact primarily on integrity and limited impact on confidentiality and availability. While the vulnerability is publicly disclosed, there are no known exploits actively used in the wild at this time. The vulnerability could also affect other parameters beyond 'Fullname', indicating a broader input validation issue within the application. The lack of available patches or vendor advisories suggests that mitigation currently relies on defensive measures and careful input handling.
Potential Impact
For European organizations, particularly educational institutions or administrative bodies using the SourceCodester Online Student Clearance System, this vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed under the context of an authenticated administrator. Successful exploitation could lead to unauthorized access to sensitive student data or manipulation of clearance records, impacting data integrity and potentially violating data protection regulations such as GDPR. Although the vulnerability does not directly affect system availability, the compromise of administrative accounts could facilitate further attacks or data breaches. The medium severity rating reflects that while the vulnerability is not critical, it still presents a meaningful threat to confidentiality and integrity if exploited. The requirement for user interaction and the need for an authenticated administrator to trigger the attack somewhat limit the scope but do not eliminate the risk, especially in environments with multiple administrators or less stringent access controls.
Mitigation Recommendations
European organizations should implement several targeted measures to mitigate this vulnerability: 1) Apply strict input validation and output encoding on all user-supplied data, especially the 'Fullname' parameter and other potentially affected inputs, to prevent script injection. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3) Restrict administrative access to the clearance system using network segmentation, VPNs, or IP whitelisting to reduce exposure. 4) Enforce multi-factor authentication (MFA) for all administrative accounts to limit the impact of credential theft. 5) Monitor logs for unusual activity related to the add-student functionality and implement alerting for suspicious input patterns. 6) If possible, conduct a code review or penetration test focused on input handling in the application to identify and remediate similar vulnerabilities. 7) Engage with the vendor or community to obtain or request patches or updates addressing this issue. 8) Educate administrators about phishing and social engineering risks that could facilitate exploitation via user interaction.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-4470: Cross Site Scripting in SourceCodester Online Student Clearance System
Description
A vulnerability classified as problematic was found in SourceCodester Online Student Clearance System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/add-student.php. The manipulation of the argument Fullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
AI-Powered Analysis
Technical Analysis
CVE-2025-4470 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Online Student Clearance System, specifically within the /admin/add-student.php file. The vulnerability arises from improper sanitization or validation of the 'Fullname' parameter, which allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without authentication, although it requires user interaction to trigger the malicious script. The disclosed exploit targets the administrative interface, potentially allowing attackers to execute arbitrary JavaScript code when an administrator or authorized user accesses the affected functionality. The vulnerability is classified as medium severity with a CVSS 4.0 score of 4.8, reflecting moderate impact primarily on integrity and limited impact on confidentiality and availability. While the vulnerability is publicly disclosed, there are no known exploits actively used in the wild at this time. The vulnerability could also affect other parameters beyond 'Fullname', indicating a broader input validation issue within the application. The lack of available patches or vendor advisories suggests that mitigation currently relies on defensive measures and careful input handling.
Potential Impact
For European organizations, particularly educational institutions or administrative bodies using the SourceCodester Online Student Clearance System, this vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed under the context of an authenticated administrator. Successful exploitation could lead to unauthorized access to sensitive student data or manipulation of clearance records, impacting data integrity and potentially violating data protection regulations such as GDPR. Although the vulnerability does not directly affect system availability, the compromise of administrative accounts could facilitate further attacks or data breaches. The medium severity rating reflects that while the vulnerability is not critical, it still presents a meaningful threat to confidentiality and integrity if exploited. The requirement for user interaction and the need for an authenticated administrator to trigger the attack somewhat limit the scope but do not eliminate the risk, especially in environments with multiple administrators or less stringent access controls.
Mitigation Recommendations
European organizations should implement several targeted measures to mitigate this vulnerability: 1) Apply strict input validation and output encoding on all user-supplied data, especially the 'Fullname' parameter and other potentially affected inputs, to prevent script injection. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3) Restrict administrative access to the clearance system using network segmentation, VPNs, or IP whitelisting to reduce exposure. 4) Enforce multi-factor authentication (MFA) for all administrative accounts to limit the impact of credential theft. 5) Monitor logs for unusual activity related to the add-student functionality and implement alerting for suspicious input patterns. 6) If possible, conduct a code review or penetration test focused on input handling in the application to identify and remediate similar vulnerabilities. 7) Engage with the vendor or community to obtain or request patches or updates addressing this issue. 8) Educate administrators about phishing and social engineering risks that could facilitate exploitation via user interaction.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-08T19:16:49.622Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd7772
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:40:58 AM
Last updated: 8/13/2025, 8:26:19 AM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.