Skip to main content

CVE-2025-4470: Cross Site Scripting in SourceCodester Online Student Clearance System

Medium
VulnerabilityCVE-2025-4470cvecve-2025-4470
Published: Fri May 09 2025 (05/09/2025, 07:00:09 UTC)
Source: CVE
Vendor/Project: SourceCodester
Product: Online Student Clearance System

Description

A vulnerability classified as problematic was found in SourceCodester Online Student Clearance System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/add-student.php. The manipulation of the argument Fullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 07/05/2025, 01:40:58 UTC

Technical Analysis

CVE-2025-4470 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Online Student Clearance System, specifically within the /admin/add-student.php file. The vulnerability arises from improper sanitization or validation of the 'Fullname' parameter, which allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without authentication, although it requires user interaction to trigger the malicious script. The disclosed exploit targets the administrative interface, potentially allowing attackers to execute arbitrary JavaScript code when an administrator or authorized user accesses the affected functionality. The vulnerability is classified as medium severity with a CVSS 4.0 score of 4.8, reflecting moderate impact primarily on integrity and limited impact on confidentiality and availability. While the vulnerability is publicly disclosed, there are no known exploits actively used in the wild at this time. The vulnerability could also affect other parameters beyond 'Fullname', indicating a broader input validation issue within the application. The lack of available patches or vendor advisories suggests that mitigation currently relies on defensive measures and careful input handling.

Potential Impact

For European organizations, particularly educational institutions or administrative bodies using the SourceCodester Online Student Clearance System, this vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed under the context of an authenticated administrator. Successful exploitation could lead to unauthorized access to sensitive student data or manipulation of clearance records, impacting data integrity and potentially violating data protection regulations such as GDPR. Although the vulnerability does not directly affect system availability, the compromise of administrative accounts could facilitate further attacks or data breaches. The medium severity rating reflects that while the vulnerability is not critical, it still presents a meaningful threat to confidentiality and integrity if exploited. The requirement for user interaction and the need for an authenticated administrator to trigger the attack somewhat limit the scope but do not eliminate the risk, especially in environments with multiple administrators or less stringent access controls.

Mitigation Recommendations

European organizations should implement several targeted measures to mitigate this vulnerability: 1) Apply strict input validation and output encoding on all user-supplied data, especially the 'Fullname' parameter and other potentially affected inputs, to prevent script injection. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3) Restrict administrative access to the clearance system using network segmentation, VPNs, or IP whitelisting to reduce exposure. 4) Enforce multi-factor authentication (MFA) for all administrative accounts to limit the impact of credential theft. 5) Monitor logs for unusual activity related to the add-student functionality and implement alerting for suspicious input patterns. 6) If possible, conduct a code review or penetration test focused on input handling in the application to identify and remediate similar vulnerabilities. 7) Engage with the vendor or community to obtain or request patches or updates addressing this issue. 8) Educate administrators about phishing and social engineering risks that could facilitate exploitation via user interaction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-08T19:16:49.622Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7772

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 1:40:58 AM

Last updated: 8/13/2025, 8:26:19 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats