CVE-2019-25270
Description
SOCA Access Control System 180612 contains a cross-site scripting vulnerability in the 'senddata' POST parameter of logged_page.php that allows attackers to inject malicious scripts. Attackers can exploit this weakness by sending crafted POST requests to execute arbitrary HTML and script code in a victim's browser session.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SOCA Access Control System 180612 has a reflected XSS in logged_page.php via the 'senddata' POST parameter, allowing arbitrary script execution.
Vulnerability
Overview
CVE-2019-25270 describes a reflected cross-site scripting (XSS) vulnerability in the SOCA Access Control System version 180612. The flaw resides in the logged_page.php script, where the senddata POST parameter is not properly sanitized before being reflected in the response. This allows an attacker can inject arbitrary HTML and JavaScript code through this parameter [1][4].
Exploitation
An attacker can exploit this vulnerability by sending a crafted POST request to the vulnerable endpoint. No authentication is required, as the logged_page.php script is accessible without prior login. The attack is reflected, meaning the malicious payload is executed in the victim's browser when they interact with the crafted request. A proof-of-concept using curl demonstrates that injecting ` into the senddata` parameter results in the script being executed and displayed as part of the page content [4].
Impact
Successful exploitation allows an attacker to execute arbitrary HTML and script code in the context of the victim's browser session. This can lead to session hijacking, defacement, or theft of sensitive information displayed on the page. The vulnerability affects versions 180612, 170000, and 141007 [4].
Mitigation
As of the publication date, no official patch has been confirmed. Users should apply input validation and output encoding for the senddata parameter. The vendor's website (socatech.com) does not provide a product page but no security advisory [3]. The vulnerability was disclosed by Zero Science Lab and published on Packet Storm [1][2].
- Zero Science Lab — Macedonian Information Security Research & Development Laboratory
- Packet Storm
- SOCA is specialized in SOCA Access Control System, Proximity, Fingerprint, Electric Locks and other Diverse Products in domestic and international markets. We provide users products with excellent quality with a safe and convenient professional needs
- SOCA Access Control System 180612 Cross Site Scripting
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: 180612
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.