CVE-2025-12279
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-27

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability has been found in code-projects Client Details System 1.0. This vulnerability affects unknown code of the file /welcome.php. Such manipulation leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-27
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-10-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fabian client_details_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-12279 is a stored Cross-Site Scripting (XSS) vulnerability in the Client Details System version 1.0, specifically in the welcome.php page. It occurs because user-controlled data, such as profile fields or uploaded filenames, is stored and later displayed in HTML without proper encoding or sanitization. This allows attackers to inject malicious JavaScript code that executes when an administrator views the page, potentially leading to session hijacking, unauthorized actions, data theft, and further attacks like CSRF or website defacement. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to execute arbitrary JavaScript in the context of an administrator's browser. This can lead to hijacking of admin session cookies, performing unauthorized actions with admin privileges, exfiltrating sensitive data, injecting fake user interfaces, triggering Cross-Site Request Forgery (CSRF) attacks, and potentially defacing the website or moving laterally within the system. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the affected welcome.php page for stored XSS by injecting typical XSS payloads such as <script>alert(1)</script> into input fields like First Name, Username, Email, or uploaded filenames and then observing if the script executes when the page is loaded. Additionally, vulnerable targets can be identified using Google dorking with queries like "inurl:welcome.php" to find exposed instances. There is also a publicly available proof-of-concept exploit on GitHub. No specific network commands are provided, but manual or automated web application security testing tools targeting stored XSS on welcome.php can be used. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying proper output encoding (e.g., using htmlspecialchars with ENT_QUOTES and UTF-8) and input validation on all user-supplied data before rendering it in HTML views to prevent script injection. Implementing defensive HTTP headers such as Content Security Policy (CSP) can reduce the impact. Since no official patches or countermeasures are documented, replacing the affected component with an alternative product is suggested. Avoid using raw echo statements for user input and sanitize filenames and profile fields. Restricting access to the affected page and monitoring for suspicious activity may also help. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart