Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office

0
Medium
VulnerabilityCVE-2025-10348cvecve-2025-10348cwe-79
Published: Thu Oct 30 2025 (10/30/2025, 13:00:43 UTC)
Source: CVE Database V5
Vendor/Project: Eveo
Product: URVE Smart Office

Description

URVE Smart Office is vulnerable to Stored XSS in report problem functionality. An attacker with a low-privileged account can upload an SVG file containing a malicious payload, which will be executed when a victim visits the URL of the uploaded resource. The resource is available to anyone without any form of authentication. This issue was fixed in version 1.1.24.

AI-Powered Analysis

AILast updated: 10/30/2025, 13:25:51 UTC

Technical Analysis

CVE-2025-10348 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the Eveo URVE Smart Office product. The vulnerability exists in the 'report problem' functionality, where an attacker with a low-privileged account can upload an SVG file containing embedded malicious JavaScript payloads. Due to improper neutralization of input during web page generation, the malicious script is stored and later executed in the context of any user who visits the URL hosting the uploaded SVG resource. Notably, this resource is publicly accessible without requiring any authentication, significantly increasing the attack surface. The vulnerability allows attackers to execute arbitrary scripts in victims' browsers, potentially leading to session hijacking, credential theft, or further exploitation such as pivoting within the network. The CVSS 4.0 base score is 5.1 (medium), reflecting network attack vector, low attack complexity, no privileges required beyond a low-privileged account, and no user interaction beyond visiting the malicious URL. The vulnerability was fixed in version 1.1.24 of URVE Smart Office. No known exploits have been reported in the wild as of the publication date. The issue was reserved in September 2025 and published in October 2025 by CERT-PL.

Potential Impact

For European organizations using vulnerable versions of URVE Smart Office, this XSS vulnerability poses risks including unauthorized script execution in users' browsers, which can lead to session hijacking, theft of sensitive information, and potential lateral movement within corporate networks. Since the malicious SVG resource is publicly accessible, attackers can easily distribute malicious links via phishing or other social engineering methods. The impact is heightened in environments where URVE Smart Office is integrated with other internal systems or handles sensitive office management data. Compromise could undermine confidentiality and integrity of user sessions and data. Additionally, the vulnerability could be leveraged as a foothold for more sophisticated attacks, especially in organizations with high-value targets or critical infrastructure. The medium severity score indicates a moderate risk, but the ease of exploitation and public accessibility of the malicious resource make timely patching critical.

Mitigation Recommendations

European organizations should immediately verify their URVE Smart Office version and upgrade to version 1.1.24 or later, where the vulnerability is fixed. Until patching is complete, restrict access to the 'report problem' functionality and uploaded resources by implementing authentication and authorization controls to prevent public access. Employ web application firewalls (WAFs) with rules targeting SVG and script injection attempts to detect and block malicious payloads. Conduct user awareness training to recognize suspicious URLs and phishing attempts that may exploit this vulnerability. Regularly audit uploaded files for malicious content and sanitize inputs on the server side to prevent script execution. Implement Content Security Policy (CSP) headers to restrict script execution sources in browsers. Monitor logs for unusual access patterns to the report problem resource URLs. Finally, coordinate with Eveo support for any additional recommended mitigations or updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-09-12T09:42:32.466Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690363e9aebfcd547465bb77

Added to database: 10/30/2025, 1:11:05 PM

Last enriched: 10/30/2025, 1:25:51 PM

Last updated: 10/30/2025, 4:35:57 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats