Description
A flaw has been found in code-projects Voting System 1.0. The affected element is an unknown function of the file /admin/candidates_edit.php. This manipulation of the argument Firstname/Lastname/Platform causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Published: 2025-10-08
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 07:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:voting_system:*:*:*:*:*:*:*:*

Thu, 09 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian voting System
CPEs cpe:2.3:a:fabian:voting_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian voting System

Wed, 08 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects voting System
Vendors & Products Code-projects
Code-projects voting System

Wed, 08 Oct 2025 01:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in code-projects Voting System 1.0. The affected element is an unknown function of the file /admin/candidates_edit.php. This manipulation of the argument Firstname/Lastname/Platform causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Title code-projects Voting System candidates_edit.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Voting System
Fabian Voting System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T06:50:22.349Z

Reserved: 2025-10-07T11:33:27.982Z

Link: CVE-2025-11421

cve-icon Vulnrichment

Updated: 2025-10-08T18:18:36.037Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-08T02:15:40.290

Modified: 2026-04-29T01:00:01.613

Link: CVE-2025-11421

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-08T13:35:08Z

Weaknesses