{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11425","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-07T11:44:02.730Z","datePublished":"2025-10-08T02:32:05.309Z","dateUpdated":"2026-02-24T06:50:50.987Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:50:50.987Z"},"title":"projectworlds Advanced Library Management System edit_admin.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"projectworlds","product":"Advanced Library Management System","versions":[{"version":"1.0","status":"affected"}],"cpes":["cpe:2.3:a:projectworlds:advanced_library_management_system:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in projectworlds Advanced Library Management System 1.0. Affected is an unknown function of the file /edit_admin.php. The manipulation of the argument firstname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Other parameters might be affected as well."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":2.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-07T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-08T05:28:18.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"chenguang (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.327360","name":"VDB-327360 | projectworlds Advanced Library Management System edit_admin.php cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.327360","name":"VDB-327360 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.666213","name":"Submit #666213 | projectworlds Advanced Library Management System 1 Improper Neutralization of Alternate XSS Syntax","tags":["third-party-advisory"]},{"url":"https://github.com/ChenGuangHuangHun/CVE/issues/2","tags":["exploit","issue-tracking"]}],"tags":["x_freeware"]},"adp":[{"references":[{"url":"https://github.com/ChenGuangHuangHun/CVE/issues/2","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-08T14:33:34.271043Z","id":"CVE-2025-11425","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-08T14:33:46.738Z"}}]}}