Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63892: n/a

0
Medium
VulnerabilityCVE-2025-63892cvecve-2025-63892
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A vulnerability was determined in SourceCodester Student Grades Management System 1.0. Affected is the function create_classroom of the file /classroom.php of the component My Classrooms Management Page. This manipulation of the argument name/description causes stored cross site scripting.

AI-Powered Analysis

AILast updated: 11/18/2025, 15:09:41 UTC

Technical Analysis

CVE-2025-63892 identifies a stored cross-site scripting vulnerability in the SourceCodester Student Grades Management System version 1.0. The flaw exists in the create_classroom function located in the /classroom.php file, which handles the creation of classroom entries via the My Classrooms Management Page. Specifically, the vulnerability stems from insufficient sanitization and validation of the 'name' and 'description' parameters submitted by users. An attacker can inject malicious JavaScript code into these fields, which is then stored persistently in the system's backend database. When other users or administrators view the affected classroom entries, the injected scripts execute within their browsers under the context of the vulnerable application. This can lead to a range of malicious outcomes, including theft of session cookies, redirection to phishing sites, or execution of unauthorized commands. The vulnerability does not require prior authentication, increasing its risk profile. Although no public exploits have been reported, the nature of stored XSS makes it a potent vector for targeted attacks, especially in environments with multiple users such as educational institutions. The absence of a CVSS score suggests the need for a severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, particularly educational institutions using the SourceCodester Student Grades Management System, this vulnerability poses significant risks. Exploitation could lead to unauthorized access to sensitive student and staff data, manipulation of grade records, and compromise of user accounts through session hijacking. The persistent nature of stored XSS means that multiple users can be affected over time, potentially leading to widespread credential theft or unauthorized administrative actions. This could damage institutional reputation, violate data protection regulations such as GDPR, and result in legal and financial consequences. Additionally, attackers could leverage this vulnerability as a foothold for further network intrusion or lateral movement within the organization's IT infrastructure. The impact is heightened in environments where users have elevated privileges or where the system interfaces with other critical educational or administrative platforms.

Mitigation Recommendations

To mitigate CVE-2025-63892, organizations should implement strict input validation and output encoding on all user-supplied data, especially the 'name' and 'description' fields in the create_classroom function. Employing context-aware encoding (e.g., HTML entity encoding) before rendering user input in the browser is essential to prevent script execution. If available, apply official patches or updates from the vendor promptly. In the absence of patches, consider disabling or restricting access to the vulnerable functionality until remediation is possible. Conduct thorough code reviews and security testing to identify and remediate similar vulnerabilities elsewhere in the application. Additionally, implement Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks. Educate users and administrators about the risks of XSS and monitor logs for suspicious activity indicative of exploitation attempts. Finally, consider migrating to more secure and actively maintained student management systems if feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691c88f8b718280d689a277a

Added to database: 11/18/2025, 2:55:52 PM

Last enriched: 11/18/2025, 3:09:41 PM

Last updated: 11/19/2025, 3:55:47 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats