First published: Sun Feb 23 2025(Updated: )
A vulnerability was found in code-projects Blood Bank System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/user.php. The manipulation of the argument email leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Blood Bank System | ||
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1579 is classified as a problematic vulnerability that allows for cross site scripting.
CVE-2025-1579 affects the processing of the email argument in the /admin/user.php file, leading to potential XSS attacks.
CVE-2025-1579 can be exploited remotely by attackers, posing a risk to users of the Blood Bank System.
The impact of CVE-2025-1579 includes the possibility of attackers executing malicious scripts in the context of a user's session.
To fix CVE-2025-1579, input validation and output encoding should be implemented in the handling of user inputs in the affected file.