CVE-2025-14347
📋 TL;DR
This CVE describes a reflected cross-site scripting (XSS) vulnerability in Proliz Software Ltd.'s OBS Student Affairs Information System. Attackers can inject malicious scripts into web pages by tricking users into clicking specially crafted links. All users of affected OBS versions are potentially at risk.
💻 Affected Systems
- Proliz Software Ltd. OBS (Student Affairs Information System)
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems.
Likely Case
Session hijacking, credential theft, or defacement of application pages through script injection.
If Mitigated
Limited impact if input validation and output encoding are properly implemented, though some risk remains.
🎯 Exploit Status
Reflected XSS typically has low exploitation complexity but requires user interaction (clicking a malicious link).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 26.5009 or later
Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-25-0463
Restart Required: Yes
Instructions:
1. Download version 26.5009 or later from Proliz Software. 2. Backup current installation and data. 3. Install the updated version following vendor instructions. 4. Restart the application server.
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy a WAF with XSS protection rules to filter malicious input.
Input Validation
allImplement strict input validation on all user-supplied data before processing.
🧯 If You Can't Patch
- Implement Content Security Policy (CSP) headers to restrict script execution sources
- Educate users about phishing risks and not clicking untrusted links
🔍 How to Verify
Check if Vulnerable:
Check application version in admin interface or configuration files. If version is below 26.5009, system is vulnerable.
Check Version:
Check application admin panel or consult vendor documentation for version checking method.
Verify Fix Applied:
Confirm version is 26.5009 or higher and test XSS payloads to ensure they are properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual long parameter values in HTTP requests
- Requests containing script tags or JavaScript in URL parameters
Network Indicators:
- HTTP requests with suspicious parameters containing script elements
- Multiple failed XSS attempts from same source
SIEM Query:
source="web_server" AND (url="*<script*" OR param="*javascript:*" OR param="*onerror=*" OR param="*onload=*")