CVE-2025-27585

5.4 MEDIUM

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in Serosoft Academia Student Information System EagleR allows attackers to inject malicious scripts into the Print Name parameter. When exploited, this enables session hijacking, credential theft, or website defacement affecting all users who view the compromised staff resource pages. This affects organizations using the vulnerable version of this student information system.

💻 Affected Systems

Products:
  • Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR
Versions: v1.0.118
Operating Systems: All platforms running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the REST API endpoint /rest/staffResource/update specifically in the Print Name parameter.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over accounts, manipulate student records, or deploy ransomware through malicious scripts executed in users' browsers.

🟠

Likely Case

Attackers inject malicious scripts that steal session cookies or credentials when legitimate users view the compromised staff resource pages, leading to unauthorized access.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution, preventing any impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the staff resource update functionality. The GitHub reference shows research details but not full weaponization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Contact Serosoft Solutions for patch information. Monitor their official channels for security updates.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation to reject or sanitize HTML/JavaScript in the Print Name parameter

Content Security Policy (CSP)

all

Deploy a strict CSP header to prevent execution of inline scripts and unauthorized sources

Content-Security-Policy: default-src 'self'; script-src 'self'

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with XSS protection rules
  • Restrict access to the /rest/staffResource/update endpoint to authorized administrators only

🔍 How to Verify

Check if Vulnerable:

Test by submitting a payload like <script>alert('XSS')</script> in the Print Name parameter and check if it executes when viewing the staff resource

Check Version:

Check the application version in the admin interface or configuration files

Verify Fix Applied:

After implementing fixes, test with the same payload to confirm it's properly sanitized or blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual characters or script tags in Print Name parameter values in REST API logs
  • Multiple failed validation attempts on staffResource/update endpoint

Network Indicators:

  • HTTP POST requests to /rest/staffResource/update containing script tags or JavaScript code

SIEM Query:

source="web_logs" AND uri_path="/rest/staffResource/update" AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:")

🔗 References

📤 Share & Export