Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64070: n/a

0
Medium
VulnerabilityCVE-2025-64070cvecve-2025-64070
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Sourcecodester Student Grades Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in the Add New Subject Description field.

AI-Powered Analysis

AILast updated: 12/09/2025, 17:56:36 UTC

Technical Analysis

CVE-2025-64070 identifies a Cross Site Scripting (XSS) vulnerability in Sourcecodester Student Grades Management System version 1.0. The vulnerability resides in the Add New Subject Description input field, where user-supplied data is not properly sanitized or encoded before being rendered in the web application. This flaw allows an attacker with low privileges (authenticated user) to inject malicious scripts that execute in the context of other users’ browsers upon viewing the affected page. The vulnerability requires user interaction, such as clicking a crafted link or viewing a manipulated page, to trigger the malicious script. The CVSS vector indicates network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), user interaction required (UI:R), and a scope change (S:C), with partial impact on confidentiality and integrity but no impact on availability. Exploitation could lead to theft of session tokens, defacement, or unauthorized actions performed on behalf of legitimate users. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly to prevent potential exploitation.

Potential Impact

For European organizations, particularly educational institutions using the Sourcecodester Student Grades Management System, this vulnerability poses a risk of unauthorized disclosure and manipulation of sensitive student information. Attackers could leverage the XSS flaw to hijack user sessions, steal credentials, or conduct phishing attacks within the application context. Although the impact on availability is negligible, the compromise of confidentiality and integrity can lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and potential legal consequences. The medium severity suggests that while the threat is not critical, it remains significant enough to warrant timely mitigation, especially in environments handling personal data. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially vulnerable component, increasing the risk profile.

Mitigation Recommendations

To mitigate CVE-2025-64070, organizations should implement strict input validation and output encoding on the Add New Subject Description field to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of potential XSS payloads. Regularly update and patch the Student Grades Management System once a vendor fix is available. Conduct security awareness training for users to recognize and avoid suspicious links or inputs that could trigger XSS attacks. Additionally, implement multi-factor authentication (MFA) to limit the damage from session hijacking. Security teams should perform code reviews and penetration testing focused on input handling and XSS vulnerabilities. Monitoring web application logs for unusual activities related to this input field can also help detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f1cb917aa519cfe209c94

Added to database: 12/2/2025, 5:07:05 PM

Last enriched: 12/9/2025, 5:56:36 PM

Last updated: 1/16/2026, 5:35:13 PM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats