Overview
A significant security vulnerability has been identified in the DevaslanPHP project-management software version 1.2.4. This vulnerability, designated as CVE-2025-52203, is a stored Cross-Site Scripting (XSS) flaw that could potentially lead to system compromise or data leakage. As such, it poses a significant risk to organizations using the affected software, warranting immediate attention and remediation.
Vulnerability Summary
CVE ID: CVE-2025-52203
Severity: High (7.6 CVSS v3)
Attack Vector: Network
Privileges Required: Low (authenticated user)
User Interaction: Required
Impact: Potential system compromise or data leakage
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
DevaslanPHP Project-Management | v1.2.4
How the Exploit Works
The CVE-2025-52203 vulnerability stems from a failure in DevaslanPHP project-management software to adequately sanitize user-supplied input in the Ticket Name field. An authenticated attacker can exploit this flaw by injecting malicious JavaScript payloads into this field. These payloads are then stored in the database and executed in the browser context of any authenticated user who logs into the Dashboard panel, potentially leading to system compromise or data leakage.
Conceptual Example Code
An example of how the vulnerability might be exploited is included below:
POST /tickets/create HTTP/1.1
Host: target.example.com
Content-Type: application/json
{
"ticket_name": "<script>malicious JavaScript code here</script>",
"ticket_description": "normal ticket description here"
}
In this example, the “ticket_name” field contains the malicious JavaScript code, which would be stored in the database and subsequently executed in the user’s browser when they accessed the Dashboard panel.
