VYPR
Low severity2.4NVD Advisory· Published Dec 8, 2025· Updated Apr 29, 2026

CVE-2025-14205

CVE-2025-14205

Description

A vulnerability was found in code-projects Chamber of Commerce Membership Management System 1.0. Impacted is an unknown function of the file /membership_profile.php of the component Your Info Handler. Performing manipulation of the argument Full Name/Address/City/State results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Chamber of Commerce Membership Management System 1.0 via the profile update form allows remote attackers to inject arbitrary scripts.

Vulnerability

Overview

A cross-site scripting (XSS) vulnerability has been identified in the code-projects Chamber of Commerce Membership Management System version 1.0. The issue resides in an unknown function within the /membership_profile.php file, part of the 'Your Info' handler. By manipulating the Full Name, Address, City, or State arguments, an attacker can inject arbitrary web script or HTML. This is a reflected or stored XSS scenario, as the injected payload is processed by the membership profile page [1].

Exploitation

Conditions

The attack vector is remote and does not require authentication, although the specific prerequisites are not detailed in the advisory. An attacker could craft a malicious request to the profile endpoint with XSS payloads in one of the mentioned form fields. Because the vulnerability has been publicly disclosed with proof-of-concept code, exploitation may be straightforward for anyone with network access to the application [1].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session. This could lead to session hijacking, defacement, or theft of sensitive information displayed on the profile page. Given the low CVSS score of 2.4, the impact is considered limited, likely because the application's data sensitivity and user interaction requirements reduce the severity [1].

Mitigation

Status

The vendor, code-projects, has not released a patch as of the publication date. Users are advised to apply input validation and output encoding on the affected fields, or consider migrating to a maintained alternative. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.