{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-13178","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-11-14T11:01:40.704Z","datePublished":"2025-11-14T19:02:10.138Z","dateUpdated":"2025-11-14T21:40:01.378Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-11-14T19:02:10.138Z"},"title":"Bdtask/CodeCanyon SalesERP User Profile edit_profile cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-80","lang":"en","description":"Basic Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Bdtask","product":"SalesERP","versions":[{"version":"20250728","status":"affected"}],"modules":["User Profile Handler"]},{"vendor":"CodeCanyon","product":"SalesERP","versions":[{"version":"20250728","status":"affected"}],"modules":["User Profile Handler"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Bdtask/CodeCanyon SalesERP up to 20250728. This vulnerability affects unknown code of the file /edit_profile of the component User Profile Handler. This manipulation of the argument first_name/last_name causes basic cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in Bdtask/CodeCanyon SalesERP up to 20250728 gefunden. Betroffen davon ist ein unbekannter Prozess der Datei /edit_profile der Komponente User Profile Handler. Durch Beeinflussen des Arguments first_name/last_name mit unbekannten Daten kann eine basic cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit ist öffentlich verfügbar und könnte genutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-11-14T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-11-14T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-11-14T12:06:47.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"4m3rr0r (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.332468","name":"VDB-332468 | Bdtask/CodeCanyon SalesERP User Profile edit_profile cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.332468","name":"VDB-332468 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.684820","name":"Submit #684820 | bdtask Sales ERP Software Latest version as of 2025-10-24 Stored HTML Injection","tags":["third-party-advisory"]},{"url":"https://github.com/4m3rr0r/PoCVulDb/issues/2","tags":["exploit","issue-tracking"]}]},"adp":[{"references":[{"url":"https://github.com/4m3rr0r/PoCVulDb/issues/2","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-14T21:39:55.568523Z","id":"CVE-2025-13178","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-14T21:40:01.378Z"}}]}}