Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63892: n/a

0
Medium
VulnerabilityCVE-2025-63892cvecve-2025-63892
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-63892 is a stored cross-site scripting (XSS) vulnerability in the SourceCodester Student Grades Management System 1. 0, specifically in the create_classroom function within the /classroom. php file. This vulnerability arises from improper sanitization of the 'name' and 'description' parameters, allowing attackers to inject malicious scripts that persist in the application. Exploitation requires authenticated access and some user interaction, but can lead to full compromise of confidentiality, integrity, and availability of the affected system. The CVSS score is 6. 8 (medium severity), reflecting the significant impact but requiring privileges and user interaction. European educational institutions using this system are at risk of data theft, session hijacking, or further network compromise. Mitigation involves implementing strict input validation and output encoding, applying patches when available, and monitoring for suspicious activity. Countries with higher adoption of SourceCodester products or targeted educational sectors, such as Germany, France, and the UK, are more likely to be affected.

AI-Powered Analysis

AILast updated: 11/25/2025, 15:26:26 UTC

Technical Analysis

CVE-2025-63892 identifies a stored cross-site scripting (XSS) vulnerability in the SourceCodester Student Grades Management System version 1.0. The flaw exists in the create_classroom function of the /classroom.php file, part of the My Classrooms Management Page component. Specifically, the vulnerability results from improper handling and sanitization of user-supplied input in the 'name' and 'description' parameters. Attackers with authenticated access can inject malicious JavaScript code that is stored persistently in the system’s database. When other users or administrators view the affected classroom pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or execution of arbitrary actions on behalf of the victim. The CVSS 3.1 score of 6.8 reflects a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), user interaction (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently in the wild, and no patches have been published yet. The vulnerability falls under CWE-79, a common category for XSS issues. Given the nature of the system—a student grades management platform—successful exploitation could expose sensitive student data and disrupt academic operations.

Potential Impact

For European organizations, particularly educational institutions using the SourceCodester Student Grades Management System, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive student information, manipulation or deletion of grade records, and potential compromise of user accounts with elevated privileges. The persistent nature of stored XSS means that multiple users could be affected once malicious scripts are injected. This can facilitate broader attacks such as phishing, malware distribution, or lateral movement within the network. Disruption of academic services could also impact institutional reputation and compliance with data protection regulations like GDPR. The requirement for authenticated access limits exposure but insider threats or compromised credentials increase risk. The absence of known exploits currently provides a window for mitigation before active attacks emerge.

Mitigation Recommendations

To mitigate CVE-2025-63892, organizations should implement strict input validation and output encoding on all user-supplied data, especially the 'name' and 'description' fields in the create_classroom function. Employing a whitelist approach for allowed characters and using security libraries or frameworks that automatically escape output can prevent script injection. Regularly update and patch the Student Grades Management System as vendors release fixes. Conduct thorough code reviews and penetration testing focused on XSS vulnerabilities. Limit user privileges to the minimum necessary to reduce the impact of compromised accounts. Implement Content Security Policy (CSP) headers to restrict script execution sources. Monitor logs and user activity for unusual behavior indicative of exploitation attempts. Educate users about phishing and social engineering risks that could lead to credential compromise. Finally, consider isolating the application environment to contain potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691c88f8b718280d689a277a

Added to database: 11/18/2025, 2:55:52 PM

Last enriched: 11/25/2025, 3:26:26 PM

Last updated: 1/7/2026, 8:47:11 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats