A reflected cross-site scripting (XSS) vulnerability exists in Institute-of-Current-Students v1.0 via the email parameter in the /postquerypublic endpoint. The application fails to properly sanitize user input before reflecting it in the HTML response. This allows unauthenticated attackers to inject and execute arbitrary JavaScript code in the context of the victim's browser by tricking them into visiting a crafted URL or submitting a malicious form. Successful exploitation may lead to session hijacking, credential theft, or other client-side attacks.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-22586 A reflected cross-site scripting (XSS) vulnerability exists in Institute-of-Current-Students v1.0 via the email parameter in the /postquerypublic endpoint. The application fails to properly sanitize user input before reflecting it in the HTML response. This allows unauthenticated attackers to inject and execute arbitrary JavaScript code in the context of the victim's browser by tricking them into visiting a crafted URL or submitting a malicious form. Successful exploitation may lead to session hijacking, credential theft, or other client-side attacks.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 09 Oct 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Vishalmathur
Vishalmathur institute-of-current-students
CPEs cpe:2.3:a:vishalmathur:institute-of-current-students:1.0:*:*:*:*:*:*:*
Vendors & Products Vishalmathur
Vishalmathur institute-of-current-students

Fri, 25 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 25 Jul 2025 13:15:00 +0000

Type Values Removed Values Added
Description A reflected cross-site scripting (XSS) vulnerability exists in Institute-of-Current-Students v1.0 via the email parameter in the /postquerypublic endpoint. The application fails to properly sanitize user input before reflecting it in the HTML response. This allows unauthenticated attackers to inject and execute arbitrary JavaScript code in the context of the victim's browser by tricking them into visiting a crafted URL or submitting a malicious form. Successful exploitation may lead to session hijacking, credential theft, or other client-side attacks.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-07-25T13:27:22.783Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-51411

cve-icon Vulnrichment

Updated: 2025-07-25T13:27:17.484Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-25T13:15:30.073

Modified: 2025-10-09T19:42:59.730

Link: CVE-2025-51411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.