VYPR
Medium severity6.1NVD Advisory· Published Aug 1, 2025· Updated Apr 15, 2026

CVE-2025-50869

CVE-2025-50869

Description

A stored Cross-Site Scripting (XSS) vulnerability exists in the qureydetails.php page of Institute-of-Current-Students 1.0, where the input fields for Query and Answer do not properly sanitize user input. Authenticated users can inject arbitrary JavaScript code.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in Institute-of-Current-Students 1.0 allows faculty-level authenticated users to inject arbitrary JavaScript via the Query and Answer fields of qureydetails.php.

Vulnerability

Description

The Institute-of-Current-Students 1.0 application suffers from a stored cross-site scripting (XSS) vulnerability located in the qureydetails.php page. This persistent XSS flaw arises because the input fields for 'Query' and 'Answer' fail to sanitize user-supplied data before storing and later reflecting it in HTTP responses [1][2]. Stored XSS occurs when an application receives data from an untrusted source and later includes that data in its responses without proper encoding or validation [1].

Attack

Mechanism

An authenticated user with faculty-level privileges can exploit this vulnerability through the 'Edit' functionality on the qureydetails.php page [2]. The attacker injects malicious JavaScript code into the Query or Answer field. When any other user (including administrators or students) views the affected page, the injected script executes in the context of the victim's browser session [1][2]. No special network position is required beyond access to the normal web interface.

Impact

Successful exploitation allows the attacker to perform arbitrary actions on behalf of the victim within the application, such as stealing session cookies, capturing keystrokes, defacing pages, or redirecting users to malicious sites [1]. Because the payload is stored persistently, every victim who visits the affected page will be compromised, making stored XSS more damaging than reflected variants [1].

Mitigation

Status

No official patch or vendor advisory has been released for this vulnerability as of the publication date. Administrators should apply input validation and output encoding to all user-supplied data within qureydetails.php, particularly for the Query and Answer fields, in accordance with CWE-79 guidelines [2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.