{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-12228","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-25T17:00:12.420Z","datePublished":"2025-10-27T05:32:07.551Z","dateUpdated":"2026-02-24T07:07:07.979Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T07:07:07.979Z"},"title":"projectworlds Expense Management System Users Page create cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"projectworlds","product":"Expense Management System","versions":[{"version":"1.0","status":"affected"}],"cpes":["cpe:2.3:a:projectworlds:expense_management_system:*:*:*:*:*:*:*:*"],"modules":["Users Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in projectworlds Expense Management System 1.0. The impacted element is an unknown function of the file /public/admin/users/create of the component Users Page. The manipulation leads to cross site scripting. The attack is possible to be carried out remotely. The exploit is publicly available and might be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":2.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-25T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-28T08:02:49.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LINXI666 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.329898","name":"VDB-329898 | projectworlds Expense Management System Users Page create cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.329898","name":"VDB-329898 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.673705","name":"Submit #673705 | projectworlds Expense Management System v1.0 Critical Persistent Cross-Site Scripting (XSS)","tags":["third-party-advisory"]},{"url":"https://github.com/QIU-DIE/CVE/issues/9","tags":["broken-link","exploit","issue-tracking"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-27T20:10:17.368826Z","id":"CVE-2025-12228","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-27T20:10:59.785Z"}}]}}