Vulnerability Description
A stored cross-site scripting (XSS) vulnerability exists in DevaslanPHP project-management v1.2.4. The vulnerability resides in the Ticket Name field, which fails to properly sanitize user-supplied input. An authenticated attacker can inject malicious JavaScript payloads into this field, which are subsequently stored in the database. When a legitimate user logs in and is redirected to the Dashboard panel "automatically upon authentication the malicious script executes in the user's browser context.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Devaslanphp | Project Management | 1.2.4 |
Related Weaknesses (CWE)
References
- https://github.com/devaslanphp/project-management/releasesRelease Notes
- https://github.com/ischyr/research-and-development/tree/main/CVE-2025-52203Exploit
FAQ
What is CVE-2025-52203?
CVE-2025-52203 is a vulnerability with a CVSS score of 7.6 (HIGH). A stored cross-site scripting (XSS) vulnerability exists in DevaslanPHP project-management v1.2.4. The vulnerability resides in the Ticket Name field, which fails to properly sanitize user-supplied in...
How severe is CVE-2025-52203?
CVE-2025-52203 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-52203?
Check the references section above for vendor advisories and patch information. Affected products include: Devaslanphp Project Management.