CVE-2025-12244
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-27

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was determined in code-projects Simple E-Banking System 1.0. This affects an unknown part of the file /eBank/register.php. Executing manipulation of the argument Username can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-27
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-10-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fabian simple_e-banking_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a cross-site scripting (XSS) flaw in the Simple E-Banking System 1.0, specifically in the /eBank/register.php file. It occurs because the application does not properly sanitize or neutralize the 'Username' input, allowing an attacker to inject malicious scripts. These scripts can be executed remotely when other users interact with the affected page, potentially leading to unauthorized actions or data theft. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for attempts to manipulate the 'Username' argument in requests to /eBank/register.php, which may indicate cross-site scripting (XSS) attacks. Network indicators include suspicious traffic from IP ranges such as 5.255.108.0/24 associated with Cobalt Strike activity. Detection can involve inspecting HTTP requests for script tags or typical XSS payloads in the Username parameter. For example, using command-line tools like curl or wget to send test payloads or grep to search logs for suspicious input patterns. Example command to check logs for suspicious Username inputs: grep -i 'Username=.*<script' /path/to/webserver/access.log [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include sanitizing and validating all user inputs, especially the 'Username' parameter in /eBank/register.php, to prevent injection of malicious scripts. Applying input filtering or encoding to neutralize HTML or script tags is essential. Additionally, updating or patching the Simple E-Banking System to a version where this vulnerability is fixed is recommended if available. If patching is not immediately possible, implementing Web Application Firewall (WAF) rules to block or alert on suspicious payloads targeting the Username parameter can help reduce risk. [2, 3]


How can this vulnerability impact me? :

The vulnerability can allow attackers to execute malicious scripts in the context of other users' browsers. This can lead to theft of sensitive client-side information such as session tokens or personal data, unauthorized actions performed on behalf of users, and potential compromise of user accounts. Since the exploit is publicly available and can be launched remotely, it poses a significant security risk. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart