CVE-2025-10117

A weakness has been identified in SourceCodester Simple To-Do List System 1.0. Impacted is an unknown function of the file /fetch_tasks.php of the component Add New Task. Executing manipulation with the input <script>alert('XSS')</script> can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
References
Link Resource
https://github.com/chen2496088236/CVE/issues/11 Exploit Third Party Advisory Issue Tracking
https://vuldb.com/?ctiid.323087 Permissions Required VDB Entry
https://vuldb.com/?id.323087 Third Party Advisory VDB Entry
https://vuldb.com/?submit.645597 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:chuck24:simple_to-do_list_system:1.0:*:*:*:*:*:*:*

History

10 Sep 2025, 16:43

Type Values Removed Values Added
References () https://github.com/chen2496088236/CVE/issues/11 - () https://github.com/chen2496088236/CVE/issues/11 - Exploit, Third Party Advisory, Issue Tracking
References () https://vuldb.com/?ctiid.323087 - () https://vuldb.com/?ctiid.323087 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.323087 - () https://vuldb.com/?id.323087 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.645597 - () https://vuldb.com/?submit.645597 - Third Party Advisory, VDB Entry
References () https://www.sourcecodester.com/ - () https://www.sourcecodester.com/ - Product
First Time Chuck24
Chuck24 simple To-do List System
CPE cpe:2.3:a:chuck24:simple_to-do_list_system:1.0:*:*:*:*:*:*:*

09 Sep 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-09 02:15

Updated : 2025-09-10 16:43


NVD link : CVE-2025-10117

Mitre link : CVE-2025-10117

CVE.ORG link : CVE-2025-10117


JSON object : View

Products Affected

chuck24

  • simple_to-do_list_system
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')