Description
A stored cross-site scripting (XSS) vulnerability exists in DevaslanPHP project-management v1.2.4. The vulnerability resides in the Ticket Name field, which fails to properly sanitize user-supplied input. An authenticated attacker can inject malicious JavaScript payloads into this field, which are subsequently stored in the database. When a legitimate user logs in and is redirected to the Dashboard panel "automatically upon authentication the malicious script executes in the user's browser context.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23275 | A stored cross-site scripting (XSS) vulnerability exists in DevaslanPHP project-management v1.2.4. The vulnerability resides in the Ticket Name field, which fails to properly sanitize user-supplied input. An authenticated attacker can inject malicious JavaScript payloads into this field, which are subsequently stored in the database. When a legitimate user logs in and is redirected to the Dashboard panel "automatically upon authentication the malicious script executes in the user's browser context. |
References
History
Wed, 06 Aug 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Devaslanphp
Devaslanphp project Management |
|
| CPEs | cpe:2.3:a:devaslanphp:project_management:1.2.4:*:*:*:*:*:*:* | |
| Vendors & Products |
Devaslanphp
Devaslanphp project Management |
Thu, 31 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Thu, 31 Jul 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stored cross-site scripting (XSS) vulnerability exists in DevaslanPHP project-management v1.2.4. The vulnerability resides in the Ticket Name field, which fails to properly sanitize user-supplied input. An authenticated attacker can inject malicious JavaScript payloads into this field, which are subsequently stored in the database. When a legitimate user logs in and is redirected to the Dashboard panel "automatically upon authentication the malicious script executes in the user's browser context. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-07-31T17:27:13.283Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-52203
Updated: 2025-07-31T17:26:21.612Z
Status : Analyzed
Published: 2025-07-31T16:15:31.423
Modified: 2025-08-06T16:18:51.437
Link: CVE-2025-52203
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD