Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70094: n/a

0
High
VulnerabilityCVE-2025-70094cvecve-2025-70094
Published: Fri Feb 13 2026 (02/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-70094 is a cross-site scripting (XSS) vulnerability found in the Generate Item Barcode function of OpenSourcePOS version 3. 4. 1. The flaw allows attackers to inject malicious scripts via the Item Category parameter, which can lead to arbitrary script execution in the context of the affected web application. This vulnerability does not require authentication and can be exploited by crafting a malicious payload. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to confidentiality and integrity of user sessions and data. European organizations using OpenSourcePOS 3. 4. 1 or similar versions are at risk, especially retail and point-of-sale environments. Mitigation involves input validation, output encoding, and applying patches once available.

AI-Powered Analysis

AILast updated: 02/13/2026, 15:48:47 UTC

Technical Analysis

CVE-2025-70094 is a cross-site scripting (XSS) vulnerability identified in the Generate Item Barcode function of OpenSourcePOS version 3.4.1. The vulnerability arises because the application fails to properly sanitize or encode user-supplied input in the Item Category parameter before reflecting it in the web interface. An attacker can exploit this by injecting crafted HTML or JavaScript payloads into the Item Category field, which when processed by the application, results in execution of arbitrary scripts in the victim's browser. This can lead to session hijacking, theft of sensitive information, or execution of malicious actions on behalf of the user. The vulnerability does not require authentication, increasing its risk profile, and no user interaction beyond visiting a maliciously crafted page or link may be necessary. Although no public exploits are currently known, the vulnerability is published and could be targeted by attackers once widely known. OpenSourcePOS is an open-source point-of-sale system used by small to medium retail businesses, which often handle payment and customer data, making this vulnerability particularly concerning. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed, but the technical details suggest a significant risk due to the nature of XSS attacks and the affected functionality.

Potential Impact

For European organizations, especially those in retail and hospitality sectors using OpenSourcePOS 3.4.1, this vulnerability could lead to unauthorized access to user sessions, theft of sensitive customer data, and potential manipulation of POS transactions. The exploitation of this XSS flaw could facilitate phishing attacks, credential theft, or unauthorized actions within the POS system, undermining trust and potentially leading to financial losses and regulatory non-compliance under GDPR. The impact on availability is limited, but the confidentiality and integrity of data processed by the POS system are at risk. Given the widespread use of open-source POS solutions in Europe, the vulnerability could affect numerous small and medium enterprises that may lack robust security controls, increasing the risk of successful exploitation.

Mitigation Recommendations

Organizations should immediately review and sanitize all inputs to the Generate Item Barcode function, specifically the Item Category parameter, implementing strict input validation and output encoding to prevent script injection. Applying security best practices such as Content Security Policy (CSP) headers can help mitigate the impact of XSS attacks. Monitoring and logging access to the vulnerable function can aid in detecting exploitation attempts. Since no official patch is currently available, organizations should consider temporary workarounds such as disabling the vulnerable feature or restricting access to trusted users only. Regularly updating OpenSourcePOS to newer versions once patches are released is critical. Additionally, training staff to recognize phishing attempts and suspicious behavior can reduce the risk of exploitation via social engineering.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698f4474c9e1ff5ad8426b2c

Added to database: 2/13/2026, 3:34:12 PM

Last enriched: 2/13/2026, 3:48:47 PM

Last updated: 2/13/2026, 4:37:24 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats