CVE-2019-25265
Description
Online Inventory Manager 3.2 contains a stored cross-site scripting vulnerability in the group description field of the admin edit groups section. Attackers can inject malicious JavaScript through the description field that will execute when the groups page is viewed, allowing potential cookie theft and client-side script execution.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Online Inventory Manager 3.2 is vulnerable to stored XSS in the group description field, allowing admin users to inject malicious JavaScript that executes when viewing groups.
Vulnerability
Online Inventory Manager 3.2, an inventory management application built with AppGini [1], contains a stored cross-site scripting (XSS) vulnerability in the group description field of the admin edit groups section. The application fails to properly sanitize user input before rendering it in the group management page, allowing arbitrary JavaScript to be embedded [2][3].
Exploitation
To exploit this vulnerability, an attacker must have administrative access or at least the ability to edit groups in the admin panel. The attacker inserts a malicious payload into the description field using the edit groups page (pageEditGroup.php). When an admin subsequently views the groups page (pageViewGroups.php), the injected script executes automatically [2]. The exploit is straightforward, as demonstrated by a public proof-of-concept that triggers an alert displaying cookies [2].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's session. This can lead to cookie theft, session hijacking, defacement, or other client-side attacks. Since the XSS is stored, it affects any user who visits the compromised groups page [2][3].
Mitigation
As of the advisory date, no official patch has been announced for this vulnerability in version 3.2. Users should upgrade to a newer version if available, or restrict access to the admin panel to trusted users. Additionally, input validation and output encoding should be applied to the group description field to prevent future XSS attacks [2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 3.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.