CVE-2019-25265
Unknown Unknown - Not Provided
Stored XSS in Online Inventory Manager 3.2 Admin Group Description

Publication date: 2026-02-03

Last updated on: 2026-02-03

Assigner: VulnCheck

Description
Online Inventory Manager 3.2 contains a stored cross-site scripting vulnerability in the group description field of the admin edit groups section. Attackers can inject malicious JavaScript through the description field that will execute when the groups page is viewed, allowing potential cookie theft and client-side script execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-03
Generated
2026-05-07
AI Q&A
2026-02-03
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
bigprof online_inventory_manager 3.2
bigprof online_inventory_manager to 3.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2019-25265 is a stored cross-site scripting (XSS) vulnerability found in Online Inventory Manager version 3.2. It exists in the group description field of the admin edit groups section. Attackers can inject malicious JavaScript code into this description field, which is then stored on the server. Whenever the groups page is viewed, the injected script executes in the context of the user's browser."}, {'type': 'paragraph', 'content': 'This persistent XSS allows attackers to perform actions such as stealing cookies or executing other client-side scripts, potentially compromising user sessions or performing unauthorized actions.'}] [2, 4]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Online Inventory Manager 3.2 is a stored cross-site scripting (XSS) issue that allows attackers to inject malicious JavaScript, potentially leading to cookie theft and client-side script execution.

Such unauthorized access to cookies and execution of malicious scripts can result in exposure of sensitive user information and session hijacking, which may violate data protection requirements under regulations like GDPR and HIPAA.

Specifically, the risk of confidentiality and integrity breaches due to this vulnerability could lead to non-compliance with standards that mandate protection of personal and sensitive data.


How can this vulnerability impact me? :

This vulnerability can lead to several security impacts including session hijacking, where attackers steal cookies to impersonate users. It also allows execution of arbitrary client-side scripts, which can result in unauthorized actions performed on behalf of users, defacement of the web interface, or exposure of sensitive information.

Because the malicious script executes whenever the groups page is viewed, any administrator or user accessing that page could be affected, increasing the risk of compromise within the application.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to inject a test script payload into the group description field in the admin edit groups section and then observing if the script executes when viewing the groups page.'}, {'type': 'paragraph', 'content': 'For example, an attacker or tester can navigate to the URL for editing a group, such as `http://localhost/inventory/admin/pageEditGroup.php?groupID=1`, and insert a payload like `"><h1><IFRAME SRC=# onmouseover=\\"alert(document.cookie)\\"></IFRAME>123</h1>` into the description field.'}, {'type': 'paragraph', 'content': 'After submitting, viewing the groups overview page (`http://localhost/inventory/admin/pageViewGroups.php`) will reveal if the injected JavaScript executes, indicating the presence of the stored XSS vulnerability.'}, {'type': 'paragraph', 'content': 'There are no specific network commands provided in the resources, but manual testing through the web interface as described is the primary detection method.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the admin edit groups section to trusted users only, as the vulnerability requires low privileges but still some level of access.

Additionally, avoid entering untrusted or suspicious input into the group description field until a patch or update is applied.

Implement input validation and output encoding on the group description field to neutralize any injected scripts.

If possible, update to a fixed version of the Online Inventory Manager or apply vendor-provided patches addressing this stored XSS vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart