CVE-2023-48198: n/a
A Cross-Site Scripting (XSS) vulnerability in the 'product description' component within '/api/stock/products' of Grocy version <= 4.0.3 allows attackers to obtain a victim's cookies.
AI Analysis
Technical Summary
CVE-2023-48198 is a Cross-Site Scripting (XSS) vulnerability identified in the Grocy application, specifically within the 'product description' component accessed via the '/api/stock/products' endpoint. Grocy is an open-source web-based self-hosted groceries and household management solution. The vulnerability affects Grocy versions up to and including 4.0.3. The flaw allows an attacker to inject malicious scripts into the product description field, which is then rendered without proper sanitization or encoding. When a victim accesses the affected endpoint or views the product description, the malicious script executes in their browser context. This can lead to the theft of cookies, session tokens, or other sensitive information stored in the browser, potentially enabling session hijacking or unauthorized access to the victim's Grocy account. The vulnerability does not require authentication to exploit if the product description is publicly accessible or if an attacker can trick an authenticated user into viewing the malicious content. There is no CVSS score assigned yet, and no known exploits have been reported in the wild as of the published date. The absence of patch links suggests that a fix may not have been released at the time of reporting, emphasizing the need for users to apply updates once available or implement temporary mitigations.
Potential Impact
For European organizations using Grocy for inventory or household management, this XSS vulnerability poses a risk primarily to confidentiality and integrity. If exploited, attackers could steal session cookies, leading to account compromise and unauthorized access to potentially sensitive inventory or personal data. While Grocy is often used in small to medium business environments or by individuals, organizations relying on it for operational management could face disruption or data leakage. The impact is heightened in environments where Grocy is integrated with other internal systems or contains sensitive business data. Additionally, compromised accounts could be leveraged for further attacks within an organization's network. The vulnerability could also undermine user trust and compliance with data protection regulations such as GDPR, especially if personal data is exposed or mishandled due to the exploit.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first monitor for an official patch or update from the Grocy development team and apply it promptly once available. In the interim, administrators should restrict access to the Grocy instance to trusted users only, ideally behind VPNs or internal networks, to reduce exposure. Input validation and output encoding should be enforced on the product description field to prevent script injection; if possible, implement web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the '/api/stock/products' endpoint. Educate users about the risks of clicking on suspicious links or viewing untrusted content within Grocy. Additionally, consider implementing Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context. Regularly audit and sanitize existing product descriptions to remove any malicious or suspicious content. Finally, monitor logs for unusual activity that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Denmark
CVE-2023-48198: n/a
Description
A Cross-Site Scripting (XSS) vulnerability in the 'product description' component within '/api/stock/products' of Grocy version <= 4.0.3 allows attackers to obtain a victim's cookies.
AI-Powered Analysis
Technical Analysis
CVE-2023-48198 is a Cross-Site Scripting (XSS) vulnerability identified in the Grocy application, specifically within the 'product description' component accessed via the '/api/stock/products' endpoint. Grocy is an open-source web-based self-hosted groceries and household management solution. The vulnerability affects Grocy versions up to and including 4.0.3. The flaw allows an attacker to inject malicious scripts into the product description field, which is then rendered without proper sanitization or encoding. When a victim accesses the affected endpoint or views the product description, the malicious script executes in their browser context. This can lead to the theft of cookies, session tokens, or other sensitive information stored in the browser, potentially enabling session hijacking or unauthorized access to the victim's Grocy account. The vulnerability does not require authentication to exploit if the product description is publicly accessible or if an attacker can trick an authenticated user into viewing the malicious content. There is no CVSS score assigned yet, and no known exploits have been reported in the wild as of the published date. The absence of patch links suggests that a fix may not have been released at the time of reporting, emphasizing the need for users to apply updates once available or implement temporary mitigations.
Potential Impact
For European organizations using Grocy for inventory or household management, this XSS vulnerability poses a risk primarily to confidentiality and integrity. If exploited, attackers could steal session cookies, leading to account compromise and unauthorized access to potentially sensitive inventory or personal data. While Grocy is often used in small to medium business environments or by individuals, organizations relying on it for operational management could face disruption or data leakage. The impact is heightened in environments where Grocy is integrated with other internal systems or contains sensitive business data. Additionally, compromised accounts could be leveraged for further attacks within an organization's network. The vulnerability could also undermine user trust and compliance with data protection regulations such as GDPR, especially if personal data is exposed or mishandled due to the exploit.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first monitor for an official patch or update from the Grocy development team and apply it promptly once available. In the interim, administrators should restrict access to the Grocy instance to trusted users only, ideally behind VPNs or internal networks, to reduce exposure. Input validation and output encoding should be enforced on the product description field to prevent script injection; if possible, implement web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the '/api/stock/products' endpoint. Educate users about the risks of clicking on suspicious links or viewing untrusted content within Grocy. Additionally, consider implementing Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context. Regularly audit and sanitize existing product descriptions to remove any malicious or suspicious content. Finally, monitor logs for unusual activity that could indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-11-13T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68e0f3c7b66c7f7acdd3eac0
Added to database: 10/4/2025, 10:15:35 AM
Last enriched: 10/4/2025, 10:19:31 AM
Last updated: 10/16/2025, 12:41:55 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.