VYPR
Medium severity6.1NVD Advisory· Published Jan 8, 2026· Updated Apr 15, 2026

CVE-2019-25270

CVE-2019-25270

Description

SOCA Access Control System 180612 contains a cross-site scripting vulnerability in the 'senddata' POST parameter of logged_page.php that allows attackers to inject malicious scripts. Attackers can exploit this weakness by sending crafted POST requests to execute arbitrary HTML and script code in a victim's browser session.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SOCA Access Control System 180612 has a reflected XSS in logged_page.php via the 'senddata' POST parameter, allowing arbitrary script execution.

Vulnerability

Overview

CVE-2019-25270 describes a reflected cross-site scripting (XSS) vulnerability in the SOCA Access Control System version 180612. The flaw resides in the logged_page.php script, where the senddata POST parameter is not properly sanitized before being reflected in the response. This allows an attacker can inject arbitrary HTML and JavaScript code through this parameter [1][4].

Exploitation

An attacker can exploit this vulnerability by sending a crafted POST request to the vulnerable endpoint. No authentication is required, as the logged_page.php script is accessible without prior login. The attack is reflected, meaning the malicious payload is executed in the victim's browser when they interact with the crafted request. A proof-of-concept using curl demonstrates that injecting ` into the senddata` parameter results in the script being executed and displayed as part of the page content [4].

Impact

Successful exploitation allows an attacker to execute arbitrary HTML and script code in the context of the victim's browser session. This can lead to session hijacking, defacement, or theft of sensitive information displayed on the page. The vulnerability affects versions 180612, 170000, and 141007 [4].

Mitigation

As of the publication date, no official patch has been confirmed. Users should apply input validation and output encoding for the senddata parameter. The vendor's website (socatech.com) does not provide a product page but no security advisory [3]. The vulnerability was disclosed by Zero Science Lab and published on Packet Storm [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.