VYPR
Medium severity6.4NVD Advisory· Published Feb 3, 2026· Updated Apr 15, 2026

CVE-2019-25265

CVE-2019-25265

Description

Online Inventory Manager 3.2 contains a stored cross-site scripting vulnerability in the group description field of the admin edit groups section. Attackers can inject malicious JavaScript through the description field that will execute when the groups page is viewed, allowing potential cookie theft and client-side script execution.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Online Inventory Manager 3.2 is vulnerable to stored XSS in the group description field, allowing admin users to inject malicious JavaScript that executes when viewing groups.

Vulnerability

Online Inventory Manager 3.2, an inventory management application built with AppGini [1], contains a stored cross-site scripting (XSS) vulnerability in the group description field of the admin edit groups section. The application fails to properly sanitize user input before rendering it in the group management page, allowing arbitrary JavaScript to be embedded [2][3].

Exploitation

To exploit this vulnerability, an attacker must have administrative access or at least the ability to edit groups in the admin panel. The attacker inserts a malicious payload into the description field using the edit groups page (pageEditGroup.php). When an admin subsequently views the groups page (pageViewGroups.php), the injected script executes automatically [2]. The exploit is straightforward, as demonstrated by a public proof-of-concept that triggers an alert displaying cookies [2].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's session. This can lead to cookie theft, session hijacking, defacement, or other client-side attacks. Since the XSS is stored, it affects any user who visits the compromised groups page [2][3].

Mitigation

As of the advisory date, no official patch has been announced for this vulnerability in version 3.2. Users should upgrade to a newer version if available, or restrict access to the admin panel to trusted users. Additionally, input validation and output encoding should be applied to the group description field to prevent future XSS attacks [2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.