Skip to main content

CVE-2025-9306: Cross Site Scripting in SourceCodester Advanced School Management System

Medium
VulnerabilityCVE-2025-9306cvecve-2025-9306
Published: Thu Aug 21 2025 (08/21/2025, 15:32:08 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Advanced School Management System

Description

A vulnerability was detected in SourceCodester Advanced School Management System 1.0. The impacted element is an unknown function of the file /index.php/notice/addNotice. The manipulation of the argument noticeSubject results in cross site scripting. It is possible to launch the attack remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 08/21/2025, 15:48:09 UTC

Technical Analysis

CVE-2025-9306 is a cross-site scripting (XSS) vulnerability identified in SourceCodester Advanced School Management System version 1.0. The vulnerability exists in the /index.php/notice/addNotice endpoint, specifically in the handling of the 'noticeSubject' parameter. An attacker can remotely manipulate this parameter to inject malicious scripts that execute in the context of the victim's browser. This type of vulnerability allows attackers to bypass the same-origin policy, potentially leading to session hijacking, defacement, or redirection to malicious sites. The CVSS 4.0 score is 5.1 (medium severity), reflecting that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, meaning limited privileges), and requires user interaction (UI:P). The vulnerability impacts confidentiality and integrity to a limited extent but does not affect availability. No authentication is required to exploit the vulnerability, but some limited privileges are needed, which suggests that the attacker may need to be an authenticated user with restricted rights. The exploit is publicly available, increasing the risk of exploitation, although no known active exploitation in the wild has been reported yet. The lack of patch links indicates that a fix may not be publicly available at this time, necessitating immediate attention from administrators using this software.

Potential Impact

For European organizations, especially educational institutions using the SourceCodester Advanced School Management System, this vulnerability poses a risk of unauthorized script execution within the context of users' browsers. This can lead to theft of session tokens, unauthorized actions performed on behalf of users, or delivery of malware. Given that school management systems handle sensitive student and staff data, including personal information and academic records, exploitation could result in data breaches violating GDPR requirements. The medium severity rating suggests that while the impact is not critical, it can still disrupt trust and lead to reputational damage. Additionally, phishing or social engineering attacks could be facilitated by this vulnerability, increasing the risk of further compromise. The requirement for limited privileges means that internal users with some access could escalate the impact, making insider threat scenarios plausible. The public availability of the exploit increases the urgency for mitigation, as attackers can readily leverage this vulnerability.

Mitigation Recommendations

Organizations should immediately audit their use of SourceCodester Advanced School Management System version 1.0 and restrict access to the /index.php/notice/addNotice functionality to trusted users only. Implement input validation and output encoding on the 'noticeSubject' parameter to neutralize malicious scripts. If possible, apply web application firewalls (WAFs) with rules targeting XSS payloads specific to this endpoint. Monitor logs for unusual activity related to notice creation or modification. Since no official patch is currently available, consider isolating the affected system from external networks or limiting access via VPN and strong authentication. Educate users about the risks of clicking on suspicious links or interacting with unexpected notices. Additionally, review and tighten user privilege assignments to minimize the number of users with access to this functionality. Prepare to deploy patches or updates from the vendor once available and consider alternative school management solutions if remediation is delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-21T05:39:51.692Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a73c20ad5a09ad00123248

Added to database: 8/21/2025, 3:32:48 PM

Last enriched: 8/21/2025, 3:48:09 PM

Last updated: 8/21/2025, 3:48:09 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats