CVE-2025-7182: Cross Site Scripting in itsourcecode Student Transcript Processing System
A vulnerability has been found in itsourcecode Student Transcript Processing System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/modules/subject/edit.php. The manipulation of the argument pre leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7182 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the itsourcecode Student Transcript Processing System, specifically within the /admin/modules/subject/edit.php file. The vulnerability arises from improper sanitization or validation of the 'pre' parameter, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is exploitable remotely without requiring authentication, and user interaction is necessary for the attack to succeed, typically when an administrator or authorized user accesses a crafted URL or input. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required. The impact primarily affects the integrity of the victim's session or data, with limited impact on confidentiality and availability. The vulnerability does not involve scope changes or security requirements alterations. Although no known exploits are currently active in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability could allow attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Given the affected system is a student transcript processing platform, the integrity and trustworthiness of academic records could be compromised, undermining institutional credibility and potentially exposing sensitive student data indirectly through session compromise or social engineering.
Potential Impact
For European organizations, particularly educational institutions using the itsourcecode Student Transcript Processing System, this vulnerability poses a risk to the integrity and trust of student academic records. Exploitation could lead to unauthorized manipulation or viewing of sensitive academic data, potentially violating GDPR regulations regarding personal data protection. The XSS vulnerability could also be leveraged to conduct phishing attacks against administrative staff, leading to broader compromise of institutional networks. The reputational damage and potential regulatory penalties could be significant. Additionally, since the system is likely to be accessed by multiple administrative users, the attack surface is considerable. The medium severity rating suggests that while the vulnerability is not critical, it still warrants prompt attention to prevent exploitation that could disrupt academic operations or lead to data breaches.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the 'pre' parameter within the /admin/modules/subject/edit.php file to neutralize malicious scripts. Applying a Content Security Policy (CSP) can help limit the impact of any injected scripts. Since no official patch is currently available, organizations should consider temporary workarounds such as restricting access to the vulnerable module to trusted IP addresses or using web application firewalls (WAFs) to detect and block malicious payloads targeting the 'pre' parameter. Regular security training for administrative users to recognize phishing attempts and suspicious URLs is also recommended. Monitoring web server logs for unusual requests to the affected endpoint can help detect exploitation attempts early. Finally, organizations should maintain an inventory of affected systems and plan for prompt patching once an official fix is released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-7182: Cross Site Scripting in itsourcecode Student Transcript Processing System
Description
A vulnerability has been found in itsourcecode Student Transcript Processing System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/modules/subject/edit.php. The manipulation of the argument pre leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7182 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the itsourcecode Student Transcript Processing System, specifically within the /admin/modules/subject/edit.php file. The vulnerability arises from improper sanitization or validation of the 'pre' parameter, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is exploitable remotely without requiring authentication, and user interaction is necessary for the attack to succeed, typically when an administrator or authorized user accesses a crafted URL or input. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required. The impact primarily affects the integrity of the victim's session or data, with limited impact on confidentiality and availability. The vulnerability does not involve scope changes or security requirements alterations. Although no known exploits are currently active in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability could allow attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Given the affected system is a student transcript processing platform, the integrity and trustworthiness of academic records could be compromised, undermining institutional credibility and potentially exposing sensitive student data indirectly through session compromise or social engineering.
Potential Impact
For European organizations, particularly educational institutions using the itsourcecode Student Transcript Processing System, this vulnerability poses a risk to the integrity and trust of student academic records. Exploitation could lead to unauthorized manipulation or viewing of sensitive academic data, potentially violating GDPR regulations regarding personal data protection. The XSS vulnerability could also be leveraged to conduct phishing attacks against administrative staff, leading to broader compromise of institutional networks. The reputational damage and potential regulatory penalties could be significant. Additionally, since the system is likely to be accessed by multiple administrative users, the attack surface is considerable. The medium severity rating suggests that while the vulnerability is not critical, it still warrants prompt attention to prevent exploitation that could disrupt academic operations or lead to data breaches.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the 'pre' parameter within the /admin/modules/subject/edit.php file to neutralize malicious scripts. Applying a Content Security Policy (CSP) can help limit the impact of any injected scripts. Since no official patch is currently available, organizations should consider temporary workarounds such as restricting access to the vulnerable module to trusted IP addresses or using web application firewalls (WAFs) to detect and block malicious payloads targeting the 'pre' parameter. Regular security training for administrative users to recognize phishing attempts and suspicious URLs is also recommended. Monitoring web server logs for unusual requests to the affected endpoint can help detect exploitation attempts early. Finally, organizations should maintain an inventory of affected systems and plan for prompt patching once an official fix is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-07T08:08:57.955Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686d2da46f40f0eb72f619dd
Added to database: 7/8/2025, 2:39:32 PM
Last enriched: 7/8/2025, 2:54:45 PM
Last updated: 7/8/2025, 2:54:45 PM
Views: 2
Related Threats
CVE-2025-6771: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Ivanti Endpoint Manager Mobile
HighCVE-2025-43019: CWE-269 Improper Privilege Management in HP Inc. HP Support Assistant
MediumCVE-2025-7184: SQL Injection in code-projects Library System
MediumCVE-2025-5464: CWE-532 Insertion of Sensitive Information into Log File in Ivanti Connect Secure
MediumCVE-2025-0293: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in Ivanti Connect Secure
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.