Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65215: n/a

0
Unknown
VulnerabilityCVE-2025-65215cvecve-2025-65215
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Sourcecodester Web-based Pharmacy Product Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in /product_expiry/add-supplier.php via the Supplier Name field.

AI-Powered Analysis

AILast updated: 12/02/2025, 18:06:33 UTC

Technical Analysis

CVE-2025-65215 identifies a Cross Site Scripting (XSS) vulnerability in the Sourcecodester Web-based Pharmacy Product Management System version 1.0. The vulnerability exists in the Supplier Name input field on the /product_expiry/add-supplier.php page, where user-supplied input is not properly sanitized or encoded before being rendered in the web application. This flaw allows an attacker to inject malicious JavaScript code that executes in the context of other users' browsers when they view the affected page or data. Such XSS attacks can be leveraged to steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious websites. The vulnerability is classified as reflected or stored XSS depending on how the input is processed, but the exact subtype is not specified. There are no patches or fixes currently available, and no known exploits have been reported in the wild. The vulnerability does not require authentication or complex user interaction beyond submitting crafted input to the vulnerable field. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. Given the nature of XSS and the criticality of pharmacy management systems handling sensitive data, this vulnerability poses a significant risk if exploited.

Potential Impact

For European organizations, especially those in the healthcare and pharmaceutical sectors, this vulnerability could lead to unauthorized access to sensitive information, including supplier details and potentially patient-related data if integrated with other systems. Attackers exploiting this XSS flaw could hijack user sessions, leading to unauthorized actions such as modifying supplier records or accessing confidential business information. The reputational damage and regulatory consequences under GDPR for data breaches could be substantial. Additionally, the injection of malicious scripts could facilitate phishing attacks or malware distribution within organizational networks. Since the affected system is a pharmacy product management platform, disruption or manipulation of supplier data could impact supply chain integrity and operational continuity. The absence of known exploits currently limits immediate risk, but the vulnerability's presence in critical healthcare infrastructure warrants proactive attention.

Mitigation Recommendations

Organizations should implement strict input validation and output encoding on the Supplier Name field to prevent malicious script injection. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly monitoring web application logs for suspicious input patterns is advised. Since no official patches are currently available, organizations should consider isolating or restricting access to the vulnerable module until a fix is released. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide interim protection. Additionally, educating users about the risks of unsolicited links and scripts can reduce the impact of potential phishing attempts leveraging this vulnerability. Finally, organizations should maintain an incident response plan tailored to web application attacks to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f279a3286267b25e84bd5

Added to database: 12/2/2025, 5:53:30 PM

Last enriched: 12/2/2025, 6:06:33 PM

Last updated: 12/2/2025, 7:00:33 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats