CVE-2025-10914

7.6 HIGH

📋 TL;DR

This is a reflected cross-site scripting (XSS) vulnerability in Proliz Software's OBS Student Affairs Information System. Attackers can inject malicious scripts into web pages that execute in victims' browsers when they visit specially crafted URLs. All users of affected OBS versions are potentially at risk.

💻 Affected Systems

Products:
  • Proliz Software Ltd. Co. OBS (Student Affairs Information System)
Versions: All versions before V26.0401
Operating Systems: Windows, Linux, Any OS running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web interface of the OBS system. Any deployment with the affected software version is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, hijack user accounts, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially compromising sensitive student data.

🟠

Likely Case

Attackers craft phishing emails with malicious links that, when clicked by authenticated users, execute scripts to steal session tokens or credentials.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before reaching users' browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (clicking a malicious link) but is straightforward to exploit once the vulnerable parameter is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V26.0401 or later

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-25-0357

Restart Required: Yes

Instructions:

1. Download the latest version (V26.0401 or newer) from Proliz Software. 2. Backup current installation and data. 3. Install the update following vendor instructions. 4. Restart the application server.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to filter malicious input before it reaches the application.

Input Validation Filter

all

Implement server-side input validation to sanitize user-supplied parameters before processing.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources
  • Deploy network segmentation to limit access to the OBS system only to authorized users

🔍 How to Verify

Check if Vulnerable:

Test by injecting basic XSS payloads (e.g., <script>alert('XSS')</script>) into URL parameters and observing if they execute in the browser.

Check Version:

Check the application version in the web interface footer or admin panel, or consult system documentation.

Verify Fix Applied:

After patching, retest with the same XSS payloads to confirm they are properly sanitized and do not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long parameter values in web logs
  • Requests containing script tags or JavaScript code in URL parameters
  • Multiple failed login attempts from single IPs

Network Indicators:

  • HTTP requests with suspicious parameters containing script elements
  • Outbound connections to unknown domains following OBS access

SIEM Query:

source="web_server_logs" AND (url="*<script>*" OR url="*javascript:*" OR url="*onerror=*" OR url="*onload=*")

🔗 References

📤 Share & Export