Skip to main content

CVE-2025-7144: Cross Site Scripting in SourceCodester Best Salon Management System

Medium
VulnerabilityCVE-2025-7144cvecve-2025-7144
Published: Mon Jul 07 2025 (07/07/2025, 20:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Best Salon Management System

Description

A vulnerability has been found in SourceCodester Best Salon Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /panel/admin-profile.php of the component Admin Profile Page. The manipulation of the argument Admin Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/07/2025, 20:54:36 UTC

Technical Analysis

CVE-2025-7144 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Best Salon Management System, specifically within the /panel/admin-profile.php file that handles the Admin Profile Page. The vulnerability arises from improper sanitization or validation of the 'Admin Name' parameter, which can be manipulated remotely by an attacker to inject malicious scripts. This type of vulnerability allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. The CVSS 4.0 vector indicates that the attack can be performed remotely without authentication (AV:N), requires low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:P). The impact on confidentiality is none (VC:N), on integrity is low (VI:L), and availability is none (VA:N). The vulnerability does not affect system confidentiality or availability but can lead to limited integrity issues, such as session hijacking, defacement, or redirection to malicious sites. Although no public exploits are currently known in the wild, the exploit details have been disclosed, increasing the risk of exploitation. The vulnerability is classified as medium severity with a CVSS score of 4.8. Since the affected product is a niche salon management system, the attack surface is limited to organizations using this specific software version. However, the vulnerability could be leveraged to compromise administrative accounts or manipulate administrative functions if exploited successfully.

Potential Impact

For European organizations using the SourceCodester Best Salon Management System 1.0, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute malicious scripts within the administrative interface, potentially leading to session hijacking, unauthorized changes to administrative profiles, or phishing attacks targeting salon staff or customers. While the direct impact on system confidentiality and availability is limited, the integrity of administrative data could be compromised, which may affect business operations and customer trust. Additionally, if the salon management system integrates with payment or personal data processing modules, XSS exploitation could facilitate further attacks such as credential theft or fraud. Given the medium severity and the requirement for high privileges and user interaction, the threat is more significant in environments where administrative users have elevated privileges and may be targeted via social engineering. The impact is heightened in European countries with strict data protection regulations (e.g., GDPR), where exploitation leading to data breaches could result in regulatory penalties and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately apply any available patches or updates from SourceCodester; if no official patch exists, implement manual input validation and output encoding on the 'Admin Name' parameter within the /panel/admin-profile.php file to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the admin interface. 3) Limit administrative access to trusted networks and enforce multi-factor authentication (MFA) to reduce the risk of credential compromise. 4) Conduct regular security awareness training for administrative users to recognize and avoid social engineering attempts that could trigger user interaction-based attacks. 5) Monitor web application logs for unusual input patterns or repeated attempts to inject scripts. 6) Consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the admin profile page. These targeted measures go beyond generic advice by focusing on the specific vulnerable parameter and the administrative context of the application.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-06T19:04:37.919Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686c31236f40f0eb72ecba92

Added to database: 7/7/2025, 8:42:11 PM

Last enriched: 7/7/2025, 8:54:36 PM

Last updated: 7/7/2025, 9:09:25 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats