First published: Wed Feb 12 2025(Updated: )
A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName/StateName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Real Estate Property Management System | ||
Fabianros Real Estate Property Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1196 is classified as problematic due to its potential for cross-site scripting vulnerabilities.
To fix CVE-2025-1196, sanitize and validate the input for the PropertyName argument in the /search.php file.
CVE-2025-1196 affects the Real Estate Property Management System version 1.0 developed by code-projects.
CVE-2025-1196 can facilitate cross-site scripting attacks, allowing an attacker to inject malicious scripts into web pages.
Yes, user data can be at risk due to CVE-2025-1196 if an attacker successfully executes a cross-site scripting attack.