VYPR
Medium severityNVD Advisory· Published Sep 8, 2025· Updated Apr 15, 2026

CVE-2025-40641

CVE-2025-40641

Description

Cross-site Scripting (XSS) vulnerability stored in Multi-Purpose Inventory Management System, consisting of a stored XSS due to lack of proper validation of user input by sending a POST request using the product_name parameter in /Controller_Products/update. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Multi-Purpose Inventory Management System allows remote attackers to inject scripts via product_name parameter, stealing authenticated users' session cookies.

Vulnerability

Overview CVE-2025-40641 is a stored cross-site scripting (XSS) vulnerability in the Multi-Purpose Inventory Management System. The vulnerability arises from insufficient validation of user input in the product_name parameter when processing POST requests to the /Controller_Products/update endpoint. This allows an attacker to inject arbitrary JavaScript code that is stored and later executed in the browsers of other users [1].

Exploitation

Prerequisites To exploit this vulnerability, an attacker must have network access to the application and the ability to send a crafted POST request with malicious content in the product_name parameter. The attack requires an authenticated user to view the page where the stored payload is rendered. The stored XSS can be triggered without any additional user interaction beyond normal browsing [1].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's session. This can lead to theft of session cookies, enabling the attacker to impersonate the victim and perform actions on their behalf within the application. The CVSS v4.0 base score is 5.1 (Medium), with the vector indicating low privileges required and user interaction needed [1].

Mitigation

Status As of the publication date, no official patch or remediation has been reported by the vendor. Users are advised to implement input validation and output encoding for the product_name parameter or apply web application firewall rules to mitigate the risk [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.