Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66921: n/a

0
High
VulnerabilityCVE-2025-66921cvecve-2025-66921
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A Cross-site scripting (XSS) vulnerability in Create/Update Item(s) Module in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the "name" parameter.

AI-Powered Analysis

AILast updated: 12/17/2025, 17:17:02 UTC

Technical Analysis

CVE-2025-66921 identifies a cross-site scripting (XSS) vulnerability in the Create/Update Item(s) module of Open Source Point of Sale (POS) version 3.4.1. The vulnerability arises because the 'name' parameter in this module does not properly sanitize user input, allowing remote attackers to inject arbitrary HTML or JavaScript code. When a victim, typically an authenticated user such as a cashier or administrator, views the affected page, the malicious script executes in their browser context. This can lead to session hijacking, theft of credentials, unauthorized actions, or redirection to malicious sites. The vulnerability is client-side but can have significant consequences for the confidentiality and integrity of the POS system and its data. No CVSS score has been assigned yet, and no public exploits are known. The lack of patch links suggests that a fix may not be available at the time of publication, requiring organizations to implement interim mitigations. The vulnerability affects version 3.4.1 of the software, which is an open-source POS solution commonly used by small to medium-sized retail and hospitality businesses. The attack vector is remote and does not require user interaction beyond viewing the malicious content, increasing the risk profile. The vulnerability was reserved and published in December 2025, indicating recent discovery.

Potential Impact

For European organizations, especially those in retail and hospitality sectors using Open Source POS v3.4.1, this vulnerability poses a risk of unauthorized script execution within the POS management interface. This can lead to theft of sensitive customer payment data, manipulation of inventory or pricing data, and disruption of sales operations. The exploitation could result in reputational damage, regulatory penalties under GDPR for data breaches, and financial losses. Since POS systems are critical for daily transactions, any compromise can affect availability and trust. The vulnerability's remote exploitation capability without user interaction increases the likelihood of attacks. European businesses relying on open-source POS solutions without robust input validation are particularly vulnerable. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks. Organizations may also face compliance challenges if they fail to address this vulnerability promptly.

Mitigation Recommendations

Organizations should immediately review and harden input validation and output encoding for the 'name' parameter in the Create/Update Item(s) module of Open Source POS. Implement Content Security Policy (CSP) headers to limit script execution sources. Monitor and restrict access to the POS management interface to trusted networks and authenticated users only. Regularly audit logs for suspicious activity related to item creation or updates. Since no official patch is currently available, consider applying community or vendor-provided patches as soon as they are released. Employ web application firewalls (WAFs) with rules to detect and block XSS payloads targeting this parameter. Train staff to recognize phishing or social engineering attempts that could leverage this vulnerability. Plan for timely updates of the POS software once a patch is released to fully remediate the issue.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942e1e21c1ff091367fece6

Added to database: 12/17/2025, 5:01:22 PM

Last enriched: 12/17/2025, 5:17:02 PM

Last updated: 12/18/2025, 7:48:30 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats