A cross-site scripting (XSS) vulnerability exists in the administrative interface of ultimatefosters UltimatePOS 4.8 where input submitted in the purchase functionality is reflected without proper escaping in the admin log panel page in the 'reference No.' field. This flaw allows an authenticated attacker to execute arbitrary JavaScript in the context of an administrator's browser session, which could lead to session hijacking or other malicious actions.
References
| Link | Resource |
|---|---|
| https://github.com/H4zaz/CVE-2025-60503 | Exploit Third Party Advisory |
| https://ultimatefosters.com | Product |
Configurations
History
03 Feb 2026, 14:56
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:ultimatefosters:ultimatepos:4.8:*:*:*:*:*:*:* | |
| First Time |
Ultimatefosters
Ultimatefosters ultimatepos |
|
| References | () https://github.com/H4zaz/CVE-2025-60503 - Exploit, Third Party Advisory | |
| References | () https://ultimatefosters.com - Product |
Information
Published : 2025-11-03 16:15
Updated : 2026-02-03 14:56
NVD link : CVE-2025-60503
Mitre link : CVE-2025-60503
CVE.ORG link : CVE-2025-60503
JSON object : View
Products Affected
ultimatefosters
- ultimatepos
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
