CVE-2025-6473
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into the School Fees Payment System via the 'transcation_remark' parameter in /fees.php. When users view affected pages, these scripts execute in their browsers, potentially stealing session cookies or redirecting to malicious sites. All users of code-projects School Fees Payment System 1.0 are affected.
💻 Affected Systems
- code-projects School Fees Payment System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal administrator session cookies, gain full system access, modify payment records, or redirect users to phishing sites that capture login credentials.
Likely Case
Attackers deface payment pages, steal user session cookies for limited account access, or redirect users to malicious advertisements.
If Mitigated
With proper input validation and output encoding, the XSS payloads are neutralized before reaching users, preventing script execution.
🎯 Exploit Status
Exploit details are publicly available on GitHub. The attack requires no authentication and can be performed remotely with basic web knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider implementing input validation and output encoding as workarounds, or replace the software with a secure alternative.
🔧 Temporary Workarounds
Input Validation Filter
allAdd server-side validation to sanitize the 'transcation_remark' parameter by removing or encoding HTML/JavaScript characters.
Edit /fees.php to include: $transcation_remark = htmlspecialchars($_POST['transcation_remark'], ENT_QUOTES, 'UTF-8');
Web Application Firewall (WAF)
allDeploy a WAF with XSS protection rules to block malicious payloads before they reach the application.
🧯 If You Can't Patch
- Restrict access to /fees.php using IP whitelisting or authentication requirements.
- Implement Content Security Policy (CSP) headers to prevent inline script execution.
🔍 How to Verify
Check if Vulnerable:
Test by submitting a payload like <script>alert('XSS')</script> in the 'transcation_remark' field and check if it executes when viewing the page.
Check Version:
Check the software version in the application's admin panel or configuration files.
Verify Fix Applied:
After applying workarounds, test with the same payload; it should display as plain text or be blocked entirely.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /fees.php with script tags or JavaScript in parameters
- Multiple failed validation attempts on the 'transcation_remark' field
Network Indicators:
- HTTP requests containing <script> tags or JavaScript functions in POST data to the vulnerable endpoint
SIEM Query:
source="web_logs" AND uri="/fees.php" AND (POST_data CONTAINS "<script>" OR POST_data CONTAINS "javascript:")