Stocky POS with Inventory Management & HRM (ui-lib) version 5.0 is affected by a Stored Cross-Site Scripting (XSS) vulnerability within the Products module available to authenticated users. The vulnerability resides in the product name parameter submitted to the product-creation endpoint via a standard POST form. Due to insufficient input sanitization and output encoding, attackers can inject HTML/JS payloads. The payload is stored and subsequently rendered unsanitized in downstream views, leading to JavaScript execution in other users' browsers when they access the affected product pages. This issue allows an authenticated attacker to execute arbitrary JavaScript in the context of another user, potentially enabling session hijacking, privilege escalation within the application, data exfiltration, or administrative account takeover. The application also lacks a restrictive Content Security Policy (CSP), increasing exploitability.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ui-lib
Ui-lib stocky |
|
| CPEs | cpe:2.3:a:ui-lib:stocky:5.0:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Ui-lib
Ui-lib stocky |
Wed, 24 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Tue, 23 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stocky
Stocky pos |
|
| Vendors & Products |
Stocky
Stocky pos |
Mon, 22 Sep 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stocky POS with Inventory Management & HRM (ui-lib) version 5.0 is affected by a Stored Cross-Site Scripting (XSS) vulnerability within the Products module available to authenticated users. The vulnerability resides in the product name parameter submitted to the product-creation endpoint via a standard POST form. Due to insufficient input sanitization and output encoding, attackers can inject HTML/JS payloads. The payload is stored and subsequently rendered unsanitized in downstream views, leading to JavaScript execution in other users' browsers when they access the affected product pages. This issue allows an authenticated attacker to execute arbitrary JavaScript in the context of another user, potentially enabling session hijacking, privilege escalation within the application, data exfiltration, or administrative account takeover. The application also lacks a restrictive Content Security Policy (CSP), increasing exploitability. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-09-22T00:00:00.000Z
Updated: 2025-09-24T14:18:00.528Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57204
Updated: 2025-09-24T14:17:53.685Z
Status : Analyzed
Published: 2025-09-22T21:15:59.757
Modified: 2025-10-03T17:45:38.487
Link: CVE-2025-57204
No data.