A vulnerability was detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0. This issue affects some unknown processing of the file /stc-log-keeper/check_profile.php of the component POST Request Handler. The manipulation of the argument profile_id results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-29135 A vulnerability was detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0. This issue affects some unknown processing of the file /stc-log-keeper/check_profile.php of the component POST Request Handler. The manipulation of the argument profile_id results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 18 Sep 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Emiloi
Emiloi e-logbook With Health Monitoring System For Covid-19
CPEs cpe:2.3:a:emiloi:e-logbook_with_health_monitoring_system_for_covid-19:1.0:*:*:*:*:*:*:*
Vendors & Products Emiloi
Emiloi e-logbook With Health Monitoring System For Covid-19

Mon, 15 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode e-logbook With Health Monitoring System For Covid-19
Vendors & Products Itsourcecode
Itsourcecode e-logbook With Health Monitoring System For Covid-19

Sun, 14 Sep 2025 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0. This issue affects some unknown processing of the file /stc-log-keeper/check_profile.php of the component POST Request Handler. The manipulation of the argument profile_id results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
Title itsourcecode E-Logbook with Health Monitoring System for COVID-19 POST Request check_profile.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-09-15T17:19:30.581Z

Reserved: 2025-09-13T19:56:31.764Z

Link: CVE-2025-10411

cve-icon Vulnrichment

Updated: 2025-09-15T17:19:25.411Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-14T22:15:31.850

Modified: 2025-09-18T19:56:34.220

Link: CVE-2025-10411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-15T10:43:32Z