Skip to main content

CVE-2025-6475: Cross Site Scripting in SourceCodester Student Result Management System

Medium
VulnerabilityCVE-2025-6475cvecve-2025-6475
Published: Sun Jun 22 2025 (06/22/2025, 12:00:15 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Student Result Management System

Description

A vulnerability was found in SourceCodester Student Result Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /script/admin/manage_students of the component Manage Students Module. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/22/2025, 12:19:36 UTC

Technical Analysis

CVE-2025-6475 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Student Result Management System, specifically within the Manage Students module located at the /script/admin/manage_students endpoint. The vulnerability arises due to improper input validation or sanitization in the processing of user-supplied data, allowing an attacker to inject malicious scripts that execute in the context of an authenticated administrator's browser session. The attack vector is remote and does not require prior authentication; however, the CVSS vector indicates that a privileged user (PR:H) is required, suggesting that exploitation necessitates some level of administrative access. User interaction is also required (UI:P), implying that the victim must perform an action such as clicking a crafted link or visiting a malicious page. The vulnerability does not impact confidentiality or availability but has a low impact on integrity due to the potential for script injection and manipulation of displayed data. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the moderate risk posed by this vulnerability. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The lack of available patches or mitigations from the vendor further elevates the urgency for organizations to implement compensating controls. XSS vulnerabilities in administrative modules are particularly concerning because they can lead to session hijacking, privilege escalation, or unauthorized actions within the application, potentially compromising the integrity of student records and administrative workflows.

Potential Impact

For European organizations, particularly educational institutions using the SourceCodester Student Result Management System, this vulnerability poses a risk to the integrity of student data and administrative operations. Successful exploitation could allow attackers to execute arbitrary scripts in the context of administrative users, potentially leading to session hijacking, unauthorized data manipulation, or the injection of malicious content that could spread malware or phishing attempts within the institution. While the vulnerability does not directly compromise confidentiality or availability, the manipulation of student results or administrative data could undermine trust in the system and cause reputational damage. Additionally, compromised administrative accounts could be leveraged to pivot to other internal systems, increasing the overall security risk. Given the critical role of student result management in academic operations, any disruption or data integrity issues could have operational and compliance implications, especially under regulations like GDPR where data accuracy and protection are mandated.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the /script/admin/manage_students endpoint to trusted administrators only, using network-level controls such as IP whitelisting or VPN access. 2. Implement strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context. 3. Employ web application firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the vulnerable endpoint. 4. Conduct thorough input validation and output encoding on all user-supplied data within the Manage Students module, especially in the affected script, to neutralize malicious scripts. 5. Educate administrative users about the risks of clicking on unsolicited links or opening suspicious emails to reduce the likelihood of user interaction-based exploitation. 6. Monitor application logs and network traffic for unusual activity indicative of exploitation attempts. 7. Engage with the vendor or community to obtain or develop patches addressing the vulnerability, and plan for timely deployment once available. 8. Consider isolating the Student Result Management System from other critical infrastructure to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-21T05:34:17.573Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6857f14d179a4edd60b459a6

Added to database: 6/22/2025, 12:04:29 PM

Last enriched: 6/22/2025, 12:19:36 PM

Last updated: 8/15/2025, 2:32:37 PM

Views: 35

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats