Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

RosarioSIS 6.7.2 - Cross-Site Scripting (XSS)

0
Medium
Published: Wed Dec 03 2025 (12/03/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

RosarioSIS 6.7.2 - Cross-Site Scripting (XSS)

AI-Powered Analysis

AILast updated: 12/03/2025, 09:33:50 UTC

Technical Analysis

The security threat concerns a reflected Cross-Site Scripting (XSS) vulnerability in RosarioSIS version 6.7.2, tracked as CVE-2020-15718. RosarioSIS is an open-source school information system used for managing schedules, student data, and other educational administrative functions. The vulnerability arises from improper sanitization of user-supplied input in the 'include_inactive' parameter within the Scheduling module's PrintSchedules.php page. An attacker with administrative credentials can craft a malicious URL containing embedded JavaScript code, which is then reflected and executed in the victim's browser when the URL is accessed. The provided proof-of-concept demonstrates injecting an 'onmouseover' event handler that triggers a JavaScript alert, confirming the XSS flaw. Exploitation requires the attacker to be logged in as an admin user and to convince or trick the victim into clicking the malicious link, indicating that user interaction is necessary. Although no known exploits are currently active in the wild, the availability of exploit code lowers the barrier for attackers to leverage this vulnerability. The impact includes potential session hijacking, theft of sensitive information, or execution of arbitrary actions with admin privileges. The vulnerability affects the web interface accessible via browsers and is tested on Windows environments. No official patch links are provided in the data, suggesting organizations should check the vendor's repository or apply input validation and output encoding as interim mitigations.

Potential Impact

For European organizations, especially educational institutions using RosarioSIS, this vulnerability poses a risk to the confidentiality and integrity of sensitive student and administrative data. Successful exploitation could allow attackers to hijack admin sessions, manipulate schedules, or access private information. Although exploitation requires admin credentials and user interaction, phishing or social engineering attacks could facilitate this. The disruption could lead to unauthorized data disclosure, administrative manipulation, and reputational damage. Given the widespread use of RosarioSIS in some European countries, the impact could be significant in the education sector. Additionally, compromised admin accounts could be leveraged for further attacks within the network. The medium severity reflects moderate risk, but the potential for targeted attacks against schools or educational authorities makes it a relevant concern.

Mitigation Recommendations

1. Immediately verify if a vendor patch or update is available for RosarioSIS beyond version 6.7.2 and apply it promptly. 2. If no patch is available, implement strict input validation and output encoding on all user-supplied parameters, especially 'include_inactive' in the Scheduling module, to neutralize script injection. 3. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in the web application context. 4. Limit administrative access to trusted networks and enforce multi-factor authentication (MFA) to reduce the risk of credential compromise. 5. Educate administrators about phishing and social engineering risks to prevent inadvertent clicking of malicious links. 6. Monitor web server logs for suspicious URL patterns indicative of attempted XSS exploitation. 7. Consider deploying Web Application Firewalls (WAF) with rules to detect and block reflected XSS payloads targeting RosarioSIS. 8. Regularly audit and review user privileges to ensure only necessary users have admin rights. 9. Isolate the RosarioSIS application environment to minimize lateral movement if compromised.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52449
Has Exploit Code
true
Code Language
text

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for RosarioSIS 6.7.2 - Cross-Site Scripting (XSS)

# Exploit Title: RosarioSIS 6.7.2 - Cross-Site Scripting (XSS)
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage: https://gitlab.com/francoisjacquet/rosariosis
# Software Link: https://gitlab.com/francoisjacquet/rosariosis
# Version: 6.7.2
# Tested on: Windows
# CVE : CVE-2020-15718

Proof Of Concept
http://rosariosis/Modules.php?modname=Scheduling/PrintSchedules.php&search_modfunc=list&include_inactive=" onmouseover="alert(1)"


Steps to Reproduce
Log in as an admin user.
Send t
... (31 more characters)
Code Length: 531 characters

Threat ID: 6930038e7fb5593475c25d06

Added to database: 12/3/2025, 9:31:58 AM

Last enriched: 12/3/2025, 9:33:50 AM

Last updated: 12/4/2025, 6:17:33 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats