CVE-2025-57204: n/a
Stocky POS with Inventory Management & HRM (ui-lib) version 5.0 is affected by a Stored Cross-Site Scripting (XSS) vulnerability within the Products module available to authenticated users. The vulnerability resides in the product name parameter submitted to the product-creation endpoint via a standard POST form. Due to insufficient input sanitization and output encoding, attackers can inject HTML/JS payloads. The payload is stored and subsequently rendered unsanitized in downstream views, leading to JavaScript execution in other users' browsers when they access the affected product pages. This issue allows an authenticated attacker to execute arbitrary JavaScript in the context of another user, potentially enabling session hijacking, privilege escalation within the application, data exfiltration, or administrative account takeover. The application also lacks a restrictive Content Security Policy (CSP), increasing exploitability.
AI Analysis
Technical Summary
CVE-2025-57204 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Stocky POS with Inventory Management & HRM (ui-lib) version 5.0. The vulnerability exists within the Products module, specifically in the product name parameter submitted via a POST form during product creation. Due to insufficient input sanitization and lack of proper output encoding, malicious HTML or JavaScript payloads can be injected by an authenticated attacker. These payloads are stored persistently and rendered unsanitized in downstream views, causing arbitrary JavaScript execution in the browsers of other users who access the affected product pages. The absence of a restrictive Content Security Policy (CSP) further increases the risk and ease of exploitation. The attack requires the attacker to be authenticated and involves user interaction (victims accessing the compromised product pages). Potential consequences include session hijacking, privilege escalation within the application, data exfiltration, and administrative account takeover. The CVSS v3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, required privileges, and user interaction. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). No known exploits are currently reported in the wild, and no patches are publicly available yet.
Potential Impact
For European organizations using Stocky POS with Inventory Management & HRM, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive business data, manipulation of inventory or HR records, and compromise of administrative accounts, potentially disrupting business operations and causing financial loss. Retailers and businesses relying on this POS system could face customer data exposure and reputational damage. The stored XSS nature means that multiple users can be affected once the malicious payload is injected, amplifying the impact. Given the POS system’s role in transaction processing and employee management, integrity and confidentiality breaches could have regulatory implications under GDPR, especially if personal data is exposed or manipulated. The lack of a restrictive CSP increases the likelihood of successful exploitation, making it easier for attackers to bypass browser security controls. Although no active exploits are known, the medium CVSS score and the potential for privilege escalation warrant timely attention.
Mitigation Recommendations
1. Immediate mitigation should focus on input validation and output encoding: Implement strict server-side input sanitization on the product name parameter to neutralize HTML and JavaScript code before storage. 2. Apply context-aware output encoding when rendering product names in the UI to prevent script execution. 3. Introduce or strengthen Content Security Policy (CSP) headers to restrict the execution of inline scripts and loading of untrusted resources, significantly reducing XSS exploitability. 4. Enforce the principle of least privilege for user roles to limit the ability of authenticated users to inject malicious content. 5. Conduct thorough code reviews and security testing of the affected module to identify and remediate similar vulnerabilities. 6. Monitor logs for suspicious POST requests to the product-creation endpoint and unusual user activity. 7. Educate users and administrators about the risks of XSS and encourage cautious handling of product data inputs. 8. Coordinate with the vendor for official patches or updates and apply them promptly once available. 9. Consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads as a temporary protective measure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden
CVE-2025-57204: n/a
Description
Stocky POS with Inventory Management & HRM (ui-lib) version 5.0 is affected by a Stored Cross-Site Scripting (XSS) vulnerability within the Products module available to authenticated users. The vulnerability resides in the product name parameter submitted to the product-creation endpoint via a standard POST form. Due to insufficient input sanitization and output encoding, attackers can inject HTML/JS payloads. The payload is stored and subsequently rendered unsanitized in downstream views, leading to JavaScript execution in other users' browsers when they access the affected product pages. This issue allows an authenticated attacker to execute arbitrary JavaScript in the context of another user, potentially enabling session hijacking, privilege escalation within the application, data exfiltration, or administrative account takeover. The application also lacks a restrictive Content Security Policy (CSP), increasing exploitability.
AI-Powered Analysis
Technical Analysis
CVE-2025-57204 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Stocky POS with Inventory Management & HRM (ui-lib) version 5.0. The vulnerability exists within the Products module, specifically in the product name parameter submitted via a POST form during product creation. Due to insufficient input sanitization and lack of proper output encoding, malicious HTML or JavaScript payloads can be injected by an authenticated attacker. These payloads are stored persistently and rendered unsanitized in downstream views, causing arbitrary JavaScript execution in the browsers of other users who access the affected product pages. The absence of a restrictive Content Security Policy (CSP) further increases the risk and ease of exploitation. The attack requires the attacker to be authenticated and involves user interaction (victims accessing the compromised product pages). Potential consequences include session hijacking, privilege escalation within the application, data exfiltration, and administrative account takeover. The CVSS v3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, required privileges, and user interaction. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). No known exploits are currently reported in the wild, and no patches are publicly available yet.
Potential Impact
For European organizations using Stocky POS with Inventory Management & HRM, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive business data, manipulation of inventory or HR records, and compromise of administrative accounts, potentially disrupting business operations and causing financial loss. Retailers and businesses relying on this POS system could face customer data exposure and reputational damage. The stored XSS nature means that multiple users can be affected once the malicious payload is injected, amplifying the impact. Given the POS system’s role in transaction processing and employee management, integrity and confidentiality breaches could have regulatory implications under GDPR, especially if personal data is exposed or manipulated. The lack of a restrictive CSP increases the likelihood of successful exploitation, making it easier for attackers to bypass browser security controls. Although no active exploits are known, the medium CVSS score and the potential for privilege escalation warrant timely attention.
Mitigation Recommendations
1. Immediate mitigation should focus on input validation and output encoding: Implement strict server-side input sanitization on the product name parameter to neutralize HTML and JavaScript code before storage. 2. Apply context-aware output encoding when rendering product names in the UI to prevent script execution. 3. Introduce or strengthen Content Security Policy (CSP) headers to restrict the execution of inline scripts and loading of untrusted resources, significantly reducing XSS exploitability. 4. Enforce the principle of least privilege for user roles to limit the ability of authenticated users to inject malicious content. 5. Conduct thorough code reviews and security testing of the affected module to identify and remediate similar vulnerabilities. 6. Monitor logs for suspicious POST requests to the product-creation endpoint and unusual user activity. 7. Educate users and administrators about the risks of XSS and encourage cautious handling of product data inputs. 8. Coordinate with the vendor for official patches or updates and apply them promptly once available. 9. Consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads as a temporary protective measure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68d1b55562c5b9ff4b6b8c05
Added to database: 9/22/2025, 8:45:09 PM
Last enriched: 9/30/2025, 12:41:18 AM
Last updated: 11/2/2025, 2:02:41 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12603: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowCVE-2025-12602: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowCVE-2025-12599: CWE-321 Use of Hard-coded Cryptographic Key in Azure Access Technology BLU-IC2
CriticalCVE-2025-12601: CWE-730 Denial of Service in Azure Access Technology BLU-IC2
CriticalCVE-2025-12600: CWE-730 Denial of Service in Azure Access Technology BLU-IC2
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.