CVE-2025-5984: Cross Site Scripting in SourceCodester Online Student Clearance System
A vulnerability has been found in SourceCodester Online Student Clearance System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /Admin/add-fee.php. The manipulation of the argument txtamt leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5984 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Online Student Clearance System, specifically within the /Admin/add-fee.php file. The vulnerability arises from improper sanitization or validation of the 'txtamt' parameter, which an attacker can manipulate to inject malicious scripts. This vulnerability is exploitable remotely without requiring authentication, although it does require some user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, indicating limited privileges), and user interaction required (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, resulting in an overall medium severity rating with a CVSS score of 5.1. The exploit has been publicly disclosed but is not known to be actively exploited in the wild. The vulnerability could allow an attacker to execute arbitrary scripts in the context of the victim's browser session, potentially leading to session hijacking, defacement, or redirection to malicious sites. Since this vulnerability affects an administrative function, it may have a higher impact if administrative users are targeted, potentially compromising administrative sessions or credentials.
Potential Impact
For European organizations, especially educational institutions or administrative bodies using the SourceCodester Online Student Clearance System, this vulnerability poses a risk of unauthorized script execution within administrative interfaces. This could lead to session hijacking, unauthorized actions performed on behalf of administrators, or the theft of sensitive data related to student clearance processes. The impact is particularly concerning if administrative users access the system from browsers vulnerable to script injection, potentially leading to broader compromise of the institution's internal systems or data. Additionally, exploitation could damage the institution's reputation and trustworthiness, especially under GDPR regulations where data protection and breach notification requirements are stringent. Although the vulnerability does not directly compromise system availability or confidentiality at a high level, the integrity of administrative operations and user trust could be significantly affected.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the 'txtamt' parameter within the /Admin/add-fee.php script to prevent injection of malicious scripts. Employing a web application firewall (WAF) with rules to detect and block XSS payloads targeting this parameter can provide an additional layer of defense. It is critical to update or patch the affected software version once a vendor-provided fix becomes available. In the interim, restricting access to the administrative interface by IP whitelisting or VPN-only access can reduce exposure. Educating administrative users about the risks of clicking on suspicious links and ensuring browsers are up to date with security patches can also reduce the risk of successful exploitation. Regular security assessments and code reviews focusing on input handling in web applications should be conducted to prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5984: Cross Site Scripting in SourceCodester Online Student Clearance System
Description
A vulnerability has been found in SourceCodester Online Student Clearance System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /Admin/add-fee.php. The manipulation of the argument txtamt leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5984 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Online Student Clearance System, specifically within the /Admin/add-fee.php file. The vulnerability arises from improper sanitization or validation of the 'txtamt' parameter, which an attacker can manipulate to inject malicious scripts. This vulnerability is exploitable remotely without requiring authentication, although it does require some user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, indicating limited privileges), and user interaction required (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, resulting in an overall medium severity rating with a CVSS score of 5.1. The exploit has been publicly disclosed but is not known to be actively exploited in the wild. The vulnerability could allow an attacker to execute arbitrary scripts in the context of the victim's browser session, potentially leading to session hijacking, defacement, or redirection to malicious sites. Since this vulnerability affects an administrative function, it may have a higher impact if administrative users are targeted, potentially compromising administrative sessions or credentials.
Potential Impact
For European organizations, especially educational institutions or administrative bodies using the SourceCodester Online Student Clearance System, this vulnerability poses a risk of unauthorized script execution within administrative interfaces. This could lead to session hijacking, unauthorized actions performed on behalf of administrators, or the theft of sensitive data related to student clearance processes. The impact is particularly concerning if administrative users access the system from browsers vulnerable to script injection, potentially leading to broader compromise of the institution's internal systems or data. Additionally, exploitation could damage the institution's reputation and trustworthiness, especially under GDPR regulations where data protection and breach notification requirements are stringent. Although the vulnerability does not directly compromise system availability or confidentiality at a high level, the integrity of administrative operations and user trust could be significantly affected.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the 'txtamt' parameter within the /Admin/add-fee.php script to prevent injection of malicious scripts. Employing a web application firewall (WAF) with rules to detect and block XSS payloads targeting this parameter can provide an additional layer of defense. It is critical to update or patch the affected software version once a vendor-provided fix becomes available. In the interim, restricting access to the administrative interface by IP whitelisting or VPN-only access can reduce exposure. Educating administrative users about the risks of clicking on suspicious links and ensuring browsers are up to date with security patches can also reduce the risk of successful exploitation. Regular security assessments and code reviews focusing on input handling in web applications should be conducted to prevent similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-10T16:05:08.443Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6848b4e53cd93dcca8312474
Added to database: 6/10/2025, 10:42:45 PM
Last enriched: 7/11/2025, 4:32:49 AM
Last updated: 8/2/2025, 2:41:36 AM
Views: 25
Related Threats
CVE-2025-7973: CWE-268: Privilege Chaining in Rockwell Automation FactoryTalk® ViewPoint
HighCVE-2025-7773: CWE-863: Incorrect Authorization in Rockwell Automation 5032-CFGB16M12P5DR
HighCVE-2025-43984: n/a
CriticalCVE-2025-36581: CWE-788: Access of Memory Location After End of Buffer in Dell PowerEdge
LowCVE-2025-9036: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Rockwell Automation FactoryTalk® Action Manager
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.