CVE-2025-65233: n/a
CVE-2025-65233 is a reflected cross-site scripting (XSS) vulnerability in SLiMS (slims9_bulian) versions before 9. 6. 0. It arises from improper handling of the PHP_SELF server variable in the index. php/sysconfig. inc. php file, allowing attackers to craft malicious URLs that execute arbitrary JavaScript in victims' browsers. The vulnerability requires no privileges but does require user interaction to trigger. It impacts confidentiality and integrity by enabling theft of session tokens or manipulation of displayed content. The CVSS score is 6.
AI Analysis
Technical Summary
CVE-2025-65233 is a reflected cross-site scripting (XSS) vulnerability identified in the SLiMS (Senayan Library Management System) software, specifically in the slims9_bulian branch prior to version 9.6.0. The root cause is improper sanitization and handling of the $_SERVER['PHP_SELF'] variable within the index.php/sysconfig.inc.php file. This variable reflects the URL path used to access the application, and when not properly escaped, it can be manipulated by an attacker to inject malicious JavaScript code. When a victim accesses a crafted URL containing the malicious payload, the injected script executes in their browser context. This can lead to theft of cookies, session tokens, or other sensitive information, as well as unauthorized actions performed on behalf of the user. The vulnerability is exploitable remotely without authentication (AV:N/PR:N), but requires user interaction (UI:R) to trigger the malicious script execution. The scope is changed (S:C) because the vulnerability affects resources beyond the vulnerable component by impacting user sessions and data confidentiality. The CVSS 3.1 base score is 6.1, indicating a medium severity level. No public exploits or widespread attacks have been reported yet, but the vulnerability poses a significant risk to users of SLiMS, especially in environments where the software is used to manage library resources and user accounts.
Potential Impact
For European organizations, particularly academic institutions, public libraries, and research centers that deploy SLiMS for managing digital and physical library assets, this vulnerability can lead to compromised user accounts and unauthorized access to sensitive information. Attackers can exploit the XSS flaw to steal session cookies, enabling impersonation of legitimate users, or to conduct phishing attacks by injecting malicious scripts that alter the displayed content. This undermines user trust and can result in data leakage or manipulation of library records. Since SLiMS is often used in multi-user environments with sensitive patron data, the confidentiality and integrity of user information are at risk. The reflected XSS does not directly impact availability but can facilitate further attacks that may disrupt services. The medium severity score reflects the balance between ease of exploitation and the requirement for user interaction. Organizations failing to address this vulnerability may face reputational damage and potential regulatory scrutiny under GDPR if personal data is compromised.
Mitigation Recommendations
Organizations should upgrade SLiMS installations to version 9.6.0 or later where this vulnerability is patched. If immediate upgrading is not feasible, implement input validation and output encoding on the $_SERVER['PHP_SELF'] variable to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Additionally, educate users about the risks of clicking on suspicious links and implement web application firewalls (WAFs) that can detect and block reflected XSS payloads targeting SLiMS endpoints. Regularly audit and monitor web server logs for unusual URL patterns that may indicate exploitation attempts. Finally, ensure session management is robust, with secure, HttpOnly cookies to reduce the impact of stolen session tokens.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-65233: n/a
Description
CVE-2025-65233 is a reflected cross-site scripting (XSS) vulnerability in SLiMS (slims9_bulian) versions before 9. 6. 0. It arises from improper handling of the PHP_SELF server variable in the index. php/sysconfig. inc. php file, allowing attackers to craft malicious URLs that execute arbitrary JavaScript in victims' browsers. The vulnerability requires no privileges but does require user interaction to trigger. It impacts confidentiality and integrity by enabling theft of session tokens or manipulation of displayed content. The CVSS score is 6.
AI-Powered Analysis
Technical Analysis
CVE-2025-65233 is a reflected cross-site scripting (XSS) vulnerability identified in the SLiMS (Senayan Library Management System) software, specifically in the slims9_bulian branch prior to version 9.6.0. The root cause is improper sanitization and handling of the $_SERVER['PHP_SELF'] variable within the index.php/sysconfig.inc.php file. This variable reflects the URL path used to access the application, and when not properly escaped, it can be manipulated by an attacker to inject malicious JavaScript code. When a victim accesses a crafted URL containing the malicious payload, the injected script executes in their browser context. This can lead to theft of cookies, session tokens, or other sensitive information, as well as unauthorized actions performed on behalf of the user. The vulnerability is exploitable remotely without authentication (AV:N/PR:N), but requires user interaction (UI:R) to trigger the malicious script execution. The scope is changed (S:C) because the vulnerability affects resources beyond the vulnerable component by impacting user sessions and data confidentiality. The CVSS 3.1 base score is 6.1, indicating a medium severity level. No public exploits or widespread attacks have been reported yet, but the vulnerability poses a significant risk to users of SLiMS, especially in environments where the software is used to manage library resources and user accounts.
Potential Impact
For European organizations, particularly academic institutions, public libraries, and research centers that deploy SLiMS for managing digital and physical library assets, this vulnerability can lead to compromised user accounts and unauthorized access to sensitive information. Attackers can exploit the XSS flaw to steal session cookies, enabling impersonation of legitimate users, or to conduct phishing attacks by injecting malicious scripts that alter the displayed content. This undermines user trust and can result in data leakage or manipulation of library records. Since SLiMS is often used in multi-user environments with sensitive patron data, the confidentiality and integrity of user information are at risk. The reflected XSS does not directly impact availability but can facilitate further attacks that may disrupt services. The medium severity score reflects the balance between ease of exploitation and the requirement for user interaction. Organizations failing to address this vulnerability may face reputational damage and potential regulatory scrutiny under GDPR if personal data is compromised.
Mitigation Recommendations
Organizations should upgrade SLiMS installations to version 9.6.0 or later where this vulnerability is patched. If immediate upgrading is not feasible, implement input validation and output encoding on the $_SERVER['PHP_SELF'] variable to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Additionally, educate users about the risks of clicking on suspicious links and implement web application firewalls (WAFs) that can detect and block reflected XSS payloads targeting SLiMS endpoints. Regularly audit and monitor web server logs for unusual URL patterns that may indicate exploitation attempts. Finally, ensure session management is robust, with secure, HttpOnly cookies to reduce the impact of stolen session tokens.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694309ba0b6f32e62bf653df
Added to database: 12/17/2025, 7:51:22 PM
Last enriched: 12/24/2025, 8:46:21 PM
Last updated: 2/8/2026, 1:58:04 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2122: SQL Injection in Xiaopi Panel
MediumCVE-2026-2120: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2115: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-2114: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-25858: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in macrozheng mall
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.