Skip to main content

CVE-2025-4547: Cross Site Scripting in SourceCodester Web-based Pharmacy Product Management System

Medium
VulnerabilityCVE-2025-4547cvecve-2025-4547
Published: Sun May 11 2025 (05/11/2025, 21:00:07 UTC)
Source: CVE
Vendor/Project: SourceCodester
Product: Web-based Pharmacy Product Management System

Description

A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Add User Page. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected.

AI-Powered Analysis

AILast updated: 07/12/2025, 03:01:35 UTC

Technical Analysis

CVE-2025-4547 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Web-based Pharmacy Product Management System. This vulnerability specifically affects the 'Add User Page' component, where multiple input parameters are susceptible to improper sanitization or validation, allowing an attacker to inject malicious scripts. The vulnerability can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload. The CVSS 4.0 vector indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the description states no authentication needed, so this may be a discrepancy), and user interaction is required (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, suggesting that the primary risk is the execution of malicious scripts in the context of a user's browser session. This could lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The lack of available patches at the time of publication increases the urgency for mitigation. Given the nature of the affected system—a pharmacy product management platform—successful exploitation could compromise sensitive operational data or user credentials, impacting business continuity and trust.

Potential Impact

For European organizations, particularly those in the healthcare and pharmaceutical sectors using the SourceCodester Web-based Pharmacy Product Management System, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized script execution in the browsers of administrative or user personnel, potentially resulting in credential theft, unauthorized access, or manipulation of pharmacy product data. This could disrupt supply chain operations, lead to data breaches involving sensitive health-related information, and damage organizational reputation. Additionally, regulatory frameworks such as GDPR impose strict requirements on data protection; a breach resulting from this vulnerability could lead to significant legal and financial consequences. The remote exploitability and public disclosure increase the likelihood of targeted attacks, especially against organizations with limited cybersecurity resources or outdated software management practices.

Mitigation Recommendations

1. Immediate implementation of input validation and output encoding on all user-supplied data fields in the 'Add User Page' to prevent script injection. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 3. Conduct a thorough code review and security audit of the entire web application to identify and remediate other potential XSS vectors. 4. Isolate the affected system within the network using segmentation and restrict access to trusted personnel only. 5. Monitor web server logs and user activity for unusual patterns indicative of exploitation attempts. 6. Educate users and administrators about phishing and social engineering tactics that could leverage this vulnerability. 7. Engage with the vendor or community to obtain or develop patches or updates addressing this vulnerability. 8. Implement multi-factor authentication (MFA) to reduce the risk of compromised credentials being exploited post-XSS attack.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-10T15:35:34.096Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6947

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 3:01:35 AM

Last updated: 8/15/2025, 5:57:17 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats