VYPR
Low severity3.5NVD Advisory· Published Dec 11, 2025· Updated Apr 29, 2026

CVE-2025-14538

CVE-2025-14538

Description

A security vulnerability has been detected in yangshare warehouseManager 仓库管理系统 1.1.0. This affects the function addCustomer of the file CustomerManageHandler.java. Such manipulation of the argument Name leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in yangshare warehouseManager 1.1.0 via the Name parameter in CustomerManageHandler.addCustomer allows remote unauthenticated attacks.

Vulnerability

Overview

CVE-2025-14538 describes a stored cross-site scripting (XSS) vulnerability in the addCustomer function of CustomerManageHandler.java within yangshare warehouseManager (仓库管理系统) version 1.1.0. The Name argument is not properly sanitized before being stored, allowing an attacker to inject arbitrary JavaScript or HTML code that will be executed when other users view the affected customer record [1].

Attack

Vector and Prerequisites

The vulnerability can be exploited remotely without authentication, as the addCustomer endpoint is accessible to unauthenticated users. The attacker only needs to supply a crafted Name parameter containing malicious script payloads. The stored payload will then be rendered in the browser of any administrator or user who accesses the customer list or detail page, making this a stored (persistent) XSS attack [1].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's session. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. Since the attack is stored, it can affect multiple users over time without requiring further interaction from the attacker [1].

Mitigation

Status

As of the publication date, the vendor has not released a patch. The issue is publicly disclosed on Gitee, and no patch has been released. Users should restrict network access to the application, implement input validation and output encoding for the Name field, or consider upgrading to a patched version if one becomes available [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.