CVE-2025-4547: Cross Site Scripting in SourceCodester Web-based Pharmacy Product Management System
A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Add User Page. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected.
AI Analysis
Technical Summary
CVE-2025-4547 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Web-based Pharmacy Product Management System. This vulnerability specifically affects the 'Add User Page' component, where multiple input parameters are susceptible to improper sanitization or validation, allowing an attacker to inject malicious scripts. The vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload. The CVSS 4.0 vector indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the description states no authentication needed, so this may be a discrepancy), and user interaction is required (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, suggesting that the primary risk is the execution of malicious scripts in the context of a user's browser session. This could lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The lack of available patches at the time of publication increases the urgency for mitigation. Given the nature of the affected system—a pharmacy product management platform—successful exploitation could compromise sensitive operational data or user credentials, impacting business continuity and trust.
Potential Impact
For European organizations, particularly those in the healthcare and pharmaceutical sectors using the SourceCodester Web-based Pharmacy Product Management System, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized script execution in the browsers of administrative or user personnel, potentially resulting in credential theft, unauthorized access, or manipulation of pharmacy product data. This could disrupt supply chain operations, lead to data breaches involving sensitive health-related information, and damage organizational reputation. Additionally, regulatory frameworks such as GDPR impose strict requirements on data protection; a breach resulting from this vulnerability could lead to significant legal and financial consequences. The remote exploitability and public disclosure increase the likelihood of targeted attacks, especially against organizations with limited cybersecurity resources or outdated software management practices.
Mitigation Recommendations
1. Immediate implementation of input validation and output encoding on all user-supplied data fields in the 'Add User Page' to prevent script injection. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 3. Conduct a thorough code review and security audit of the entire web application to identify and remediate other potential XSS vectors. 4. Isolate the affected system within the network using segmentation and restrict access to trusted personnel only. 5. Monitor web server logs and user activity for unusual patterns indicative of exploitation attempts. 6. Educate users and administrators about phishing and social engineering tactics that could leverage this vulnerability. 7. Engage with the vendor or community to obtain or develop patches or updates addressing this vulnerability. 8. Implement multi-factor authentication (MFA) to reduce the risk of compromised credentials being exploited post-XSS attack.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-4547: Cross Site Scripting in SourceCodester Web-based Pharmacy Product Management System
Description
A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Add User Page. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-4547 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Web-based Pharmacy Product Management System. This vulnerability specifically affects the 'Add User Page' component, where multiple input parameters are susceptible to improper sanitization or validation, allowing an attacker to inject malicious scripts. The vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload. The CVSS 4.0 vector indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the description states no authentication needed, so this may be a discrepancy), and user interaction is required (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, suggesting that the primary risk is the execution of malicious scripts in the context of a user's browser session. This could lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The lack of available patches at the time of publication increases the urgency for mitigation. Given the nature of the affected system—a pharmacy product management platform—successful exploitation could compromise sensitive operational data or user credentials, impacting business continuity and trust.
Potential Impact
For European organizations, particularly those in the healthcare and pharmaceutical sectors using the SourceCodester Web-based Pharmacy Product Management System, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized script execution in the browsers of administrative or user personnel, potentially resulting in credential theft, unauthorized access, or manipulation of pharmacy product data. This could disrupt supply chain operations, lead to data breaches involving sensitive health-related information, and damage organizational reputation. Additionally, regulatory frameworks such as GDPR impose strict requirements on data protection; a breach resulting from this vulnerability could lead to significant legal and financial consequences. The remote exploitability and public disclosure increase the likelihood of targeted attacks, especially against organizations with limited cybersecurity resources or outdated software management practices.
Mitigation Recommendations
1. Immediate implementation of input validation and output encoding on all user-supplied data fields in the 'Add User Page' to prevent script injection. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 3. Conduct a thorough code review and security audit of the entire web application to identify and remediate other potential XSS vectors. 4. Isolate the affected system within the network using segmentation and restrict access to trusted personnel only. 5. Monitor web server logs and user activity for unusual patterns indicative of exploitation attempts. 6. Educate users and administrators about phishing and social engineering tactics that could leverage this vulnerability. 7. Engage with the vendor or community to obtain or develop patches or updates addressing this vulnerability. 8. Implement multi-factor authentication (MFA) to reduce the risk of compromised credentials being exploited post-XSS attack.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-10T15:35:34.096Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6947
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 3:01:35 AM
Last updated: 8/15/2025, 5:57:17 PM
Views: 18
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.