Cross-Site Scripting Vulnerability in code-projects Job Recruitment by code-projects
CVE-2025-0961

5.1MEDIUM

Key Information:

Vendor
Code-projects
Status
Job Recruitment
Vendor
CVE Published:
1 February 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A cross-site scripting vulnerability exists in the Job Recruitment application from code-projects, specifically affecting the file /_parse/load_job-details.php. By manipulating the 'business_stream_name' parameter, an attacker can execute arbitrary JavaScript in the context of the user’s browser. This allows for the potential theft of session cookies, defacement of web content, or redirection to malicious sites. The exploit is publicly known, increasing the urgency for users to patch vulnerable installations.

Affected Version(s)

Job Recruitment 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

j0hn.FFFFF (VulDB User)
j0hn.FFFFF (VulDB User)
.