Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70094: n/a

0
Medium
VulnerabilityCVE-2025-70094cvecve-2025-70094
Published: Fri Feb 13 2026 (02/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A cross-site scripting (XSS) vulnerability in the Generate Item Barcode function of OpenSourcePOS v3.4.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Item Category parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/13/2026, 15:48:47 UTC

Technical Analysis

CVE-2025-70094 is a cross-site scripting (XSS) vulnerability identified in the Generate Item Barcode function of OpenSourcePOS version 3.4.1. The vulnerability arises because the application fails to properly sanitize or encode user-supplied input in the Item Category parameter before reflecting it in the web interface. An attacker can exploit this by injecting crafted HTML or JavaScript payloads into the Item Category field, which when processed by the application, results in execution of arbitrary scripts in the victim's browser. This can lead to session hijacking, theft of sensitive information, or execution of malicious actions on behalf of the user. The vulnerability does not require authentication, increasing its risk profile, and no user interaction beyond visiting a maliciously crafted page or link may be necessary. Although no public exploits are currently known, the vulnerability is published and could be targeted by attackers once widely known. OpenSourcePOS is an open-source point-of-sale system used by small to medium retail businesses, which often handle payment and customer data, making this vulnerability particularly concerning. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed, but the technical details suggest a significant risk due to the nature of XSS attacks and the affected functionality.

Potential Impact

For European organizations, especially those in retail and hospitality sectors using OpenSourcePOS 3.4.1, this vulnerability could lead to unauthorized access to user sessions, theft of sensitive customer data, and potential manipulation of POS transactions. The exploitation of this XSS flaw could facilitate phishing attacks, credential theft, or unauthorized actions within the POS system, undermining trust and potentially leading to financial losses and regulatory non-compliance under GDPR. The impact on availability is limited, but the confidentiality and integrity of data processed by the POS system are at risk. Given the widespread use of open-source POS solutions in Europe, the vulnerability could affect numerous small and medium enterprises that may lack robust security controls, increasing the risk of successful exploitation.

Mitigation Recommendations

Organizations should immediately review and sanitize all inputs to the Generate Item Barcode function, specifically the Item Category parameter, implementing strict input validation and output encoding to prevent script injection. Applying security best practices such as Content Security Policy (CSP) headers can help mitigate the impact of XSS attacks. Monitoring and logging access to the vulnerable function can aid in detecting exploitation attempts. Since no official patch is currently available, organizations should consider temporary workarounds such as disabling the vulnerable feature or restricting access to trusted users only. Regularly updating OpenSourcePOS to newer versions once patches are released is critical. Additionally, training staff to recognize phishing attempts and suspicious behavior can reduce the risk of exploitation via social engineering.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698f4474c9e1ff5ad8426b2c

Added to database: 2/13/2026, 3:34:12 PM

Last enriched: 2/13/2026, 3:48:47 PM

Last updated: 3/30/2026, 5:06:35 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses