CVE Alert: CVE-2025-10914 – Proliz Software Ltd. Co. – OBS (Student Affairs Information System)

CVE-2025-10914

HIGHNo exploitation known

Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Proliz Software Ltd. Co. OBS (Student Affairs Information System) allows Reflected XSS.This issue affects OBS (Student Affairs Information System): before V26.0401.

CVSS v3.1 (7.6)
AV NETWORK · AC LOW · PR NONE · UI REQUIRED · S UNCHANGED
Vendor
Proliz Software Ltd. Co.
Product
OBS (Student Affairs Information System)
Versions
0 lt V26.0401
CWE
CWE-79, CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’)
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
Published
2025-10-23T08:36:08.858Z
Updated
2025-10-23T08:36:08.858Z

AI Summary Analysis

Risk verdict

High risk: remote, user-interaction–driven reflected XSS with high confidentiality impact; exploitability is plausible in web-accessible contexts.

Why this matters

Reflected XSS can siphon credentials or session data and perform actions in a victim’s browser, potentially exposing sensitive student information. In a student information system, this enables credential theft, data exfiltration, and reputational damage if attackers access or manipulate records.

Most likely attack path

An attacker lures a user to a crafted link or page that causes the vulnerable input to be reflected without proper neutralisation. This requires only a valid user account to access the web app; no privileges are required beyond normal user access. Because the flaw is network-exposed and reflects user-supplied data, lateral movement is limited without additional footholds, but token or session data could be at risk during interaction.

Who is most exposed

Institutions hosting web-based student information portals or staff/student-facing dashboards—particularly those with publicly reachable interfaces or weak input sanitisation—are most at risk. Organisations with broad external access and standard web app workflows are prime targets.

Detection ideas

  • Logs showing unusual reflected script payloads in request parameters.
  • WAF alerts for common XSS patterns in input fields or responses.
  • Anomalous HTML/script content appearing in pages that reflect user input.
  • User reports of unexpected pop-ups or session anomalies following link clicks.

Mitigation and prioritisation

  • Apply the vendor’s patched build promptly; ensure all instances are updated.
  • Strengthen input validation and output encoding; enforce a strict Content Security Policy.
  • Deploy WAF rules to block reflected XSS patterns and enable CSP reporting.
  • Review session-management controls and rotate tokens after patching.
  • Change-management: test in staging, verify no regressions, deploy in production with a rollback plan. If KEV/EPSS data becomes available indicating active exploitation, escalate to priority 1.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features