Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10612: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in giSoft Information Technologies City Guide

0
Medium
VulnerabilityCVE-2025-10612cvecve-2025-10612cwe-79
Published: Tue Oct 21 2025 (10/21/2025, 08:48:37 UTC)
Source: CVE Database V5
Vendor/Project: giSoft Information Technologies
Product: City Guide

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in giSoft Information Technologies City Guide allows Reflected XSS.This issue affects City Guide: before 1.4.45.

AI-Powered Analysis

AILast updated: 10/28/2025, 09:02:11 UTC

Technical Analysis

CVE-2025-10612 is a reflected Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting giSoft Information Technologies' City Guide software versions prior to 1.4.45. The vulnerability stems from improper neutralization of input during web page generation, allowing attackers to inject malicious JavaScript code that is reflected back to users without proper sanitization or encoding. When a victim clicks a crafted URL or interacts with malicious content, the injected script executes in their browser context, potentially stealing session cookies, performing actions on behalf of the user, or redirecting to malicious sites. The vulnerability requires no privileges (PR:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, potentially impacting the confidentiality and integrity of user data. The CVSS 3.1 score of 6.1 reflects a medium severity level, with partial impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The absence of patch links suggests that a fix may be forthcoming or that users should monitor vendor advisories. The vulnerability is particularly relevant for organizations deploying City Guide in web-facing environments, especially those serving tourists or city residents who may be targeted via phishing or social engineering campaigns.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive user information such as session tokens or personal data, enabling account hijacking or impersonation within the City Guide application. The integrity of user interactions may be compromised, allowing attackers to perform unauthorized actions or redirect users to malicious websites. While availability is not impacted, the reputational damage and potential regulatory consequences under GDPR for data breaches could be significant. Organizations operating in sectors reliant on City Guide for tourism, municipal services, or local business promotion are at higher risk, as attackers may exploit this vulnerability to target large user bases. The medium severity indicates that while the threat is not critical, it still warrants timely mitigation to prevent exploitation, especially given the potential for phishing campaigns leveraging this XSS flaw. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

Organizations should implement multiple layers of defense to mitigate this vulnerability effectively. First, apply any available patches or updates from giSoft Information Technologies as soon as they are released. In the absence of patches, deploy web application firewalls (WAFs) with rules designed to detect and block reflected XSS payloads targeting City Guide endpoints. Review and enhance input validation and output encoding mechanisms in the application code to ensure all user-supplied data is properly sanitized before rendering. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct user awareness training to educate users about the risks of clicking suspicious links, especially those purporting to be from City Guide or related services. Monitor logs and network traffic for unusual activity indicative of attempted XSS exploitation. Finally, coordinate with giSoft for timely vulnerability disclosures and remediation guidance, and consider isolating or restricting access to vulnerable City Guide instances until patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2025-09-17T09:15:05.471Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f74b48cab76000dd20dfa0

Added to database: 10/21/2025, 8:58:48 AM

Last enriched: 10/28/2025, 9:02:11 AM

Last updated: 12/3/2025, 4:52:32 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats