CVE-2025-56697: n/a
A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the /users/adminpanel/admin/home.php?page=feedbacks file of Kashipara Computer Base Test v1.0. Attackers can inject malicious scripts via the smyFeedbacks POST parameter in /users/home.php.
AI Analysis
Technical Summary
CVE-2025-56697 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Kashipara Computer Base Test v1.0 application, specifically within the /users/adminpanel/admin/home.php?page=feedbacks endpoint. The vulnerability arises due to insufficient input validation or output encoding of the smyFeedbacks POST parameter in the /users/home.php script. An attacker can exploit this flaw by injecting malicious JavaScript code into the feedback submission functionality, which is then stored on the server and subsequently rendered in the admin panel without proper sanitization. When an administrator or user with access to the admin panel views the feedback page, the malicious script executes in their browser context. This can lead to session hijacking, credential theft, unauthorized actions performed on behalf of the admin user, or the deployment of further malware. The vulnerability is particularly dangerous because it is stored, meaning the malicious payload persists and can affect multiple users over time. No CVSS score is currently assigned, and no patches or known exploits in the wild have been reported as of the publication date. The lack of affected version details suggests the vulnerability may impact all deployments of version 1.0 or earlier, or that versioning information is incomplete. Stored XSS vulnerabilities typically require no authentication to inject payloads if the feedback form is publicly accessible, but exploitation impact is realized when privileged users access the affected page.
Potential Impact
For European organizations using Kashipara Computer Base Test v1.0, this vulnerability poses a significant risk to the confidentiality and integrity of administrative sessions and data. Successful exploitation could allow attackers to hijack admin accounts, leading to unauthorized access to sensitive test data, user information, or administrative controls. This could result in data breaches, manipulation of test results, or disruption of testing services. The persistence of the malicious script increases the attack surface and potential damage. Organizations in sectors such as education, certification bodies, or training providers relying on this software could face reputational damage, regulatory penalties under GDPR for data breaches, and operational downtime. Since the vulnerability affects the admin panel, the availability impact is moderate but could escalate if attackers leverage the access to deploy ransomware or other disruptive payloads. The lack of known exploits suggests a window of opportunity for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit the input handling of the smyFeedbacks POST parameter and implement robust input validation and output encoding to neutralize malicious scripts. Employing a web application firewall (WAF) with rules targeting XSS payloads can provide interim protection. Restrict access to the admin panel via network segmentation and strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of exploitation. Regularly monitor logs for unusual activity related to feedback submissions and admin panel access. If possible, update or patch the Kashipara Computer Base Test software once a vendor fix is released. In the absence of an official patch, consider disabling or restricting the feedback feature temporarily. Conduct security awareness training for administrators to recognize signs of XSS exploitation and encourage the use of security-conscious browsers or extensions that can mitigate script-based attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-56697: n/a
Description
A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the /users/adminpanel/admin/home.php?page=feedbacks file of Kashipara Computer Base Test v1.0. Attackers can inject malicious scripts via the smyFeedbacks POST parameter in /users/home.php.
AI-Powered Analysis
Technical Analysis
CVE-2025-56697 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Kashipara Computer Base Test v1.0 application, specifically within the /users/adminpanel/admin/home.php?page=feedbacks endpoint. The vulnerability arises due to insufficient input validation or output encoding of the smyFeedbacks POST parameter in the /users/home.php script. An attacker can exploit this flaw by injecting malicious JavaScript code into the feedback submission functionality, which is then stored on the server and subsequently rendered in the admin panel without proper sanitization. When an administrator or user with access to the admin panel views the feedback page, the malicious script executes in their browser context. This can lead to session hijacking, credential theft, unauthorized actions performed on behalf of the admin user, or the deployment of further malware. The vulnerability is particularly dangerous because it is stored, meaning the malicious payload persists and can affect multiple users over time. No CVSS score is currently assigned, and no patches or known exploits in the wild have been reported as of the publication date. The lack of affected version details suggests the vulnerability may impact all deployments of version 1.0 or earlier, or that versioning information is incomplete. Stored XSS vulnerabilities typically require no authentication to inject payloads if the feedback form is publicly accessible, but exploitation impact is realized when privileged users access the affected page.
Potential Impact
For European organizations using Kashipara Computer Base Test v1.0, this vulnerability poses a significant risk to the confidentiality and integrity of administrative sessions and data. Successful exploitation could allow attackers to hijack admin accounts, leading to unauthorized access to sensitive test data, user information, or administrative controls. This could result in data breaches, manipulation of test results, or disruption of testing services. The persistence of the malicious script increases the attack surface and potential damage. Organizations in sectors such as education, certification bodies, or training providers relying on this software could face reputational damage, regulatory penalties under GDPR for data breaches, and operational downtime. Since the vulnerability affects the admin panel, the availability impact is moderate but could escalate if attackers leverage the access to deploy ransomware or other disruptive payloads. The lack of known exploits suggests a window of opportunity for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit the input handling of the smyFeedbacks POST parameter and implement robust input validation and output encoding to neutralize malicious scripts. Employing a web application firewall (WAF) with rules targeting XSS payloads can provide interim protection. Restrict access to the admin panel via network segmentation and strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of exploitation. Regularly monitor logs for unusual activity related to feedback submissions and admin panel access. If possible, update or patch the Kashipara Computer Base Test software once a vendor fix is released. In the absence of an official patch, consider disabling or restricting the feedback feature temporarily. Conduct security awareness training for administrators to recognize signs of XSS exploitation and encourage the use of security-conscious browsers or extensions that can mitigate script-based attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68c9496f561c5e692a3e1c5d
Added to database: 9/16/2025, 11:26:39 AM
Last enriched: 9/16/2025, 11:27:14 AM
Last updated: 10/30/2025, 11:27:34 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-34287: CWE-732 Incorrect Permission Assignment for Critical Resource in Nagios XI
HighCVE-2025-34286: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Nagios XI
CriticalCVE-2025-34135: CWE-732 Incorrect Permission Assignment for Critical Resource in Nagios XI
MediumCVE-2025-34134: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Nagios XI
CriticalCVE-2024-14009: CWE-269 Improper Privilege Management in Nagios XI
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.