CVE-2025-65215: n/a
Sourcecodester Web-based Pharmacy Product Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in /product_expiry/add-supplier.php via the Supplier Name field.
AI Analysis
Technical Summary
CVE-2025-65215 identifies a Cross Site Scripting (XSS) vulnerability in the Sourcecodester Web-based Pharmacy Product Management System version 1.0. The vulnerability exists in the Supplier Name input field on the /product_expiry/add-supplier.php page, where user-supplied input is not properly sanitized or encoded before being rendered in the web application. This flaw allows an attacker to inject malicious JavaScript code that executes in the context of other users' browsers when they view the affected page or data. Such XSS attacks can be leveraged to steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious websites. The vulnerability is classified as reflected or stored XSS depending on how the input is processed, but the exact subtype is not specified. There are no patches or fixes currently available, and no known exploits have been reported in the wild. The vulnerability does not require authentication or complex user interaction beyond submitting crafted input to the vulnerable field. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. Given the nature of XSS and the criticality of pharmacy management systems handling sensitive data, this vulnerability poses a significant risk if exploited.
Potential Impact
For European organizations, especially those in the healthcare and pharmaceutical sectors, this vulnerability could lead to unauthorized access to sensitive information, including supplier details and potentially patient-related data if integrated with other systems. Attackers exploiting this XSS flaw could hijack user sessions, leading to unauthorized actions such as modifying supplier records or accessing confidential business information. The reputational damage and regulatory consequences under GDPR for data breaches could be substantial. Additionally, the injection of malicious scripts could facilitate phishing attacks or malware distribution within organizational networks. Since the affected system is a pharmacy product management platform, disruption or manipulation of supplier data could impact supply chain integrity and operational continuity. The absence of known exploits currently limits immediate risk, but the vulnerability's presence in critical healthcare infrastructure warrants proactive attention.
Mitigation Recommendations
Organizations should implement strict input validation and output encoding on the Supplier Name field to prevent malicious script injection. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly monitoring web application logs for suspicious input patterns is advised. Since no official patches are currently available, organizations should consider isolating or restricting access to the vulnerable module until a fix is released. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide interim protection. Additionally, educating users about the risks of unsolicited links and scripts can reduce the impact of potential phishing attempts leveraging this vulnerability. Finally, organizations should maintain an incident response plan tailored to web application attacks to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-65215: n/a
Description
Sourcecodester Web-based Pharmacy Product Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in /product_expiry/add-supplier.php via the Supplier Name field.
AI-Powered Analysis
Technical Analysis
CVE-2025-65215 identifies a Cross Site Scripting (XSS) vulnerability in the Sourcecodester Web-based Pharmacy Product Management System version 1.0. The vulnerability exists in the Supplier Name input field on the /product_expiry/add-supplier.php page, where user-supplied input is not properly sanitized or encoded before being rendered in the web application. This flaw allows an attacker to inject malicious JavaScript code that executes in the context of other users' browsers when they view the affected page or data. Such XSS attacks can be leveraged to steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious websites. The vulnerability is classified as reflected or stored XSS depending on how the input is processed, but the exact subtype is not specified. There are no patches or fixes currently available, and no known exploits have been reported in the wild. The vulnerability does not require authentication or complex user interaction beyond submitting crafted input to the vulnerable field. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. Given the nature of XSS and the criticality of pharmacy management systems handling sensitive data, this vulnerability poses a significant risk if exploited.
Potential Impact
For European organizations, especially those in the healthcare and pharmaceutical sectors, this vulnerability could lead to unauthorized access to sensitive information, including supplier details and potentially patient-related data if integrated with other systems. Attackers exploiting this XSS flaw could hijack user sessions, leading to unauthorized actions such as modifying supplier records or accessing confidential business information. The reputational damage and regulatory consequences under GDPR for data breaches could be substantial. Additionally, the injection of malicious scripts could facilitate phishing attacks or malware distribution within organizational networks. Since the affected system is a pharmacy product management platform, disruption or manipulation of supplier data could impact supply chain integrity and operational continuity. The absence of known exploits currently limits immediate risk, but the vulnerability's presence in critical healthcare infrastructure warrants proactive attention.
Mitigation Recommendations
Organizations should implement strict input validation and output encoding on the Supplier Name field to prevent malicious script injection. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly monitoring web application logs for suspicious input patterns is advised. Since no official patches are currently available, organizations should consider isolating or restricting access to the vulnerable module until a fix is released. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide interim protection. Additionally, educating users about the risks of unsolicited links and scripts can reduce the impact of potential phishing attempts leveraging this vulnerability. Finally, organizations should maintain an incident response plan tailored to web application attacks to quickly address any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692f279a3286267b25e84bd5
Added to database: 12/2/2025, 5:53:30 PM
Last enriched: 12/2/2025, 6:06:33 PM
Last updated: 12/2/2025, 7:00:33 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66454: CWE-321: Use of Hard-coded Cryptographic Key in ArcadeAI arcade-mcp
MediumCVE-2025-65896: n/a
UnknownCVE-2025-34352: CWE-378 Creation of Temporary File With Insecure Permissions in JumpCloud Inc. Remote Assist
HighCVE-2025-58386: n/a
CriticalCVE-2025-52622: CWE-1188 Initialization of a Resource with an Insecure Default in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.