Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63949: n/a

0
Medium
VulnerabilityCVE-2025-63949cvecve-2025-63949
Published: Thu Dec 18 2025 (12/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A Reflected Cross-Site Scripting (XSS) vulnerability in yohanawi Hotel Management System (commit 87e004a) allows a remote attacker to execute arbitrary web script via the 'error' parameter in pages/room.php.

AI-Powered Analysis

AILast updated: 12/18/2025, 20:57:44 UTC

Technical Analysis

CVE-2025-63949 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the yohanawi Hotel Management System, specifically within the 'error' parameter of the pages/room.php script. Reflected XSS occurs when user-supplied input is immediately echoed by the web application without proper sanitization or encoding, allowing attackers to craft malicious URLs that execute arbitrary JavaScript in the victim's browser. This vulnerability requires no authentication and no user interaction beyond clicking a crafted link or visiting a malicious page referencing the vulnerable parameter. The attacker can exploit this flaw to perform actions such as session hijacking, stealing cookies, redirecting users to phishing sites, or delivering malware. Although no public exploits are currently known, the vulnerability is publicly disclosed and thus could be targeted by attackers. The lack of a CVSS score suggests the need for a manual severity assessment. The vulnerability affects all versions of the yohanawi system where the parameter is vulnerable, as no specific affected versions are listed. The absence of patches or mitigation links indicates that users must implement their own input validation and output encoding measures. This vulnerability is particularly concerning for hotel management systems, which handle sensitive customer data and payment information, increasing the risk of data breaches and reputational damage.

Potential Impact

For European organizations, especially those in the hospitality sector using the yohanawi Hotel Management System, this vulnerability poses a significant risk to customer data confidentiality and system integrity. Exploitation could lead to theft of session cookies, enabling attackers to impersonate legitimate users or administrators, potentially leading to unauthorized access to sensitive booking and payment information. The reflected XSS attack can also be used to deliver further malware or phishing attacks targeting customers or employees, damaging trust and causing financial losses. Additionally, successful exploitation could result in regulatory non-compliance issues under GDPR due to inadequate protection of personal data. The impact extends beyond individual organizations to the broader tourism industry, potentially affecting customer confidence in digital services. Since the vulnerability requires no authentication and can be triggered remotely, the attack surface is broad, increasing the likelihood of exploitation if unmitigated.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement strict input validation and output encoding on the 'error' parameter in pages/room.php to neutralize malicious scripts. Employing context-aware encoding (e.g., HTML entity encoding) ensures that injected scripts are not executed by browsers. Deploying a robust Content Security Policy (CSP) can further restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Regularly updating and patching the yohanawi Hotel Management System when vendor updates become available is critical. Additionally, security teams should conduct thorough code reviews and penetration testing focusing on input handling. User education on recognizing suspicious links and phishing attempts can reduce the risk of successful exploitation. Monitoring web traffic for unusual patterns and implementing Web Application Firewalls (WAFs) with XSS detection rules can provide additional layers of defense. Finally, organizations should prepare incident response plans specific to web-based attacks to quickly contain and remediate any exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694466f94eb3efac36a822c8

Added to database: 12/18/2025, 8:41:29 PM

Last enriched: 12/18/2025, 8:57:44 PM

Last updated: 12/19/2025, 9:24:01 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats