A vulnerability was detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0. This issue affects some unknown processing of the file /stc-log-keeper/check_profile.php of the component POST Request Handler. The manipulation of the argument profile_id results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
History

Thu, 18 Sep 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Emiloi
Emiloi e-logbook With Health Monitoring System For Covid-19
CPEs cpe:2.3:a:emiloi:e-logbook_with_health_monitoring_system_for_covid-19:1.0:*:*:*:*:*:*:*
Vendors & Products Emiloi
Emiloi e-logbook With Health Monitoring System For Covid-19

Mon, 15 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode e-logbook With Health Monitoring System For Covid-19
Vendors & Products Itsourcecode
Itsourcecode e-logbook With Health Monitoring System For Covid-19

Sun, 14 Sep 2025 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in itsourcecode E-Logbook with Health Monitoring System for COVID-19 1.0. This issue affects some unknown processing of the file /stc-log-keeper/check_profile.php of the component POST Request Handler. The manipulation of the argument profile_id results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
Title itsourcecode E-Logbook with Health Monitoring System for COVID-19 POST Request check_profile.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-09-14T21:32:07.222Z

Updated: 2025-09-15T17:19:30.581Z

Reserved: 2025-09-13T19:56:31.764Z

Link: CVE-2025-10411

cve-icon Vulnrichment

Updated: 2025-09-15T17:19:25.411Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-14T22:15:31.850

Modified: 2025-09-18T19:56:34.220

Link: CVE-2025-10411

cve-icon Redhat

No data.