Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

RosarioSIS 6.7.2 - Cross Site Scripting (XSS)

0
Medium
Published: Wed Dec 03 2025 (12/03/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

RosarioSIS 6.7.2 - Cross Site Scripting (XSS)

AI-Powered Analysis

AILast updated: 12/03/2025, 09:33:26 UTC

Technical Analysis

The security threat concerns a stored or reflected Cross Site Scripting (XSS) vulnerability in RosarioSIS version 6.7.2, an open-source school information system widely used for managing educational data. The vulnerability resides in the 'tab' parameter of the Users Preferences module URL, which fails to properly sanitize user input, allowing injection of arbitrary JavaScript code. The exploit requires the attacker to be authenticated, typically as an admin user, and the request must not include the 'modfunc' parameter to trigger the vulnerability. When exploited, the malicious script executes in the context of the victim's browser, potentially enabling session hijacking, credential theft, or unauthorized actions within the application. The proof-of-concept exploit demonstrates triggering a JavaScript alert via an 'onmouseover' event embedded in the URL parameter. The vulnerability is identified as CVE-2020-15716 and has been publicly disclosed with exploit code available on Exploit-DB. Although no active exploitation in the wild has been reported, the presence of exploit code increases the risk of opportunistic attacks. The vulnerability affects web-based deployments of RosarioSIS, which may be hosted on Windows or Linux servers, and impacts users accessing the system via web browsers, including iOS devices as indicated by tags. The attack surface is limited to authenticated users, but given that administrative privileges are typically required, the impact on confidentiality and integrity can be significant. No official patch links are provided, suggesting that organizations must apply custom mitigations or updates from the vendor repository. The exploit leverages standard web technologies and requires user interaction to trigger the malicious script execution.

Potential Impact

For European organizations, especially educational institutions using RosarioSIS, this XSS vulnerability poses risks including unauthorized access to sensitive student and staff data, session hijacking of administrative accounts, and potential manipulation of school records. The compromise of admin sessions could lead to privilege escalation, data integrity violations, and disruption of school operations. Given the nature of the software, confidentiality breaches could expose personal identifiable information (PII) of minors, raising compliance issues under GDPR. The vulnerability's requirement for authentication limits exposure but does not eliminate risk, as insider threats or compromised credentials could be exploited. Additionally, phishing campaigns could leverage this vulnerability to trick users into executing malicious scripts. The impact on availability is minimal but possible if attackers use the vulnerability to inject disruptive scripts. Overall, the threat could undermine trust in school IT systems and lead to regulatory penalties if data protection is compromised.

Mitigation Recommendations

European organizations should immediately audit their RosarioSIS deployments to identify affected versions, specifically version 6.7.2. Since no official patch links are provided, organizations should: 1) Upgrade to the latest RosarioSIS version where this vulnerability is fixed, or apply vendor-provided patches from the official GitLab repository. 2) Implement strict input validation and output encoding on all user-controllable parameters, especially the 'tab' parameter in the Users Preferences module. 3) Enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. 4) Limit administrative access to trusted networks and enforce multi-factor authentication (MFA) to reduce risk from compromised credentials. 5) Monitor web server logs and application logs for suspicious requests containing script injection patterns. 6) Educate users, particularly administrators, about the risks of clicking on untrusted links and the importance of session security. 7) Consider deploying Web Application Firewalls (WAF) with rules to detect and block XSS payloads targeting RosarioSIS. 8) Regularly review and update session management policies to invalidate sessions on suspicious activity. These measures combined will reduce the risk of exploitation and limit potential damage.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52450
Has Exploit Code
true
Code Language
text

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for RosarioSIS 6.7.2 - Cross Site Scripting (XSS)

# Exploit Title: RosarioSIS 6.7.2 - Cross Site Scripting (XSS)
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage: https://gitlab.com/francoisjacquet/rosariosis
# Software Link: https://gitlab.com/francoisjacquet/rosariosis
# Version: 6.7.2
# Tested on: Windows
# CVE : CVE-2020-15716


Proof Of Concept
http://rosariosis/Modules.php?modname=Users/Preferences.php&tab=%22%20onmouseover%3Dalert%281%29%20x%3D%22

**Conditions**:  
1. User must be authenticated (as shown by the session 
... (180 more characters)
Code Length: 680 characters

Threat ID: 6930038e7fb5593475c25d01

Added to database: 12/3/2025, 9:31:58 AM

Last enriched: 12/3/2025, 9:33:26 AM

Last updated: 12/5/2025, 2:27:20 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats