Skip to main content

CVE-2025-7144: Cross Site Scripting in SourceCodester Best Salon Management System

Medium
VulnerabilityCVE-2025-7144cvecve-2025-7144
Published: Mon Jul 07 2025 (07/07/2025, 20:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Best Salon Management System

Description

A vulnerability has been found in SourceCodester Best Salon Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /panel/admin-profile.php of the component Admin Profile Page. The manipulation of the argument Admin Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/14/2025, 21:41:37 UTC

Technical Analysis

CVE-2025-7144 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester Best Salon Management System, specifically within the Admin Profile Page component located at /panel/admin-profile.php. The vulnerability arises from improper sanitization or validation of the 'Admin Name' input parameter, which allows an attacker to inject malicious scripts. This flaw can be exploited remotely without authentication, although the CVSS vector indicates that privileges are required (PR:H) and user interaction is needed (UI:P), suggesting that the attacker must have some level of administrative access and trick a user into interacting with the malicious payload. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits have been reported in the wild to date. The CVSS 4.0 base score is 4.8, categorizing it as a medium severity issue. The attack could lead to the execution of arbitrary scripts in the context of the victim’s browser, potentially enabling session hijacking, defacement, or redirection to malicious sites. The vulnerability does not affect confidentiality or availability directly but impacts integrity and user trust. The lack of a patch or mitigation from the vendor increases the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations using the SourceCodester Best Salon Management System, particularly those in the beauty and wellness sector, this vulnerability poses a risk to administrative users who manage salon profiles and sensitive business data. Exploitation could allow attackers to execute malicious scripts within the admin interface, potentially leading to unauthorized actions, theft of session tokens, or manipulation of salon data. This could result in reputational damage, loss of customer trust, and regulatory compliance issues under GDPR if personal data is compromised. Since the vulnerability requires administrative privileges and user interaction, the risk is somewhat mitigated but remains significant in environments where insider threats or phishing attacks are possible. The impact is heightened in multi-tenant or cloud-hosted deployments where a compromised admin session could affect multiple clients. Additionally, the lack of vendor patches means organizations must rely on internal controls to prevent exploitation.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Restrict administrative access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2) Conduct regular security awareness training focused on phishing and social engineering to minimize the chance of user interaction with malicious payloads. 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the 'Admin Name' parameter. 4) Implement input validation and output encoding at the application level if source code access is available, sanitizing inputs to neutralize script injection. 5) Monitor administrative logs for unusual activities that could indicate exploitation attempts. 6) Consider isolating the admin panel behind VPNs or IP whitelisting to limit exposure. 7) Plan for migration to updated or alternative salon management systems with active security support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-06T19:04:37.919Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686c31236f40f0eb72ecba92

Added to database: 7/7/2025, 8:42:11 PM

Last enriched: 7/14/2025, 9:41:37 PM

Last updated: 8/19/2025, 11:38:34 PM

Views: 34

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats