Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10955: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Netcad Software Inc. Netigma

0
Medium
VulnerabilityCVE-2025-10955cvecve-2025-10955cwe-79
Published: Thu Nov 06 2025 (11/06/2025, 14:46:09 UTC)
Source: CVE Database V5
Vendor/Project: Netcad Software Inc.
Product: Netigma

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Netcad Software Inc. Netigma allows XSS Through HTTP Query Strings.This issue affects Netigma: from 6.3.5 before 6.3.5 V8.

AI-Powered Analysis

AILast updated: 11/13/2025, 15:53:42 UTC

Technical Analysis

CVE-2025-10955 is a Cross-site Scripting (XSS) vulnerability categorized under CWE-79, found in Netcad Software Inc.'s Netigma product, specifically version 6.3.5. The vulnerability stems from improper neutralization of input during web page generation, where HTTP query strings are not adequately sanitized before being reflected in the web interface. This allows attackers to craft malicious URLs containing executable scripts that, when visited by a user, execute in the context of the victim's browser session. The CVSS v3.1 score is 6.1 (medium severity), with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction. The scope is changed, indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity but not availability. Potential consequences include session hijacking, defacement, or redirection to malicious sites. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability affects Netigma version 6.3.5 before 6.3.5 V8, indicating that later versions may have remediated the issue. Since Netigma is used for geospatial and infrastructure management, exploitation could have operational impacts if attackers manipulate displayed data or steal session information.

Potential Impact

For European organizations, the impact of CVE-2025-10955 can be significant, especially for entities relying on Netigma for critical infrastructure, urban planning, or geospatial data management. Successful exploitation could lead to unauthorized access to user sessions, enabling attackers to impersonate legitimate users and potentially manipulate sensitive spatial data or operational dashboards. This could result in misinformation, disruption of decision-making processes, or leakage of confidential information. While the vulnerability does not directly affect system availability, the integrity and confidentiality breaches could undermine trust in affected systems and lead to regulatory compliance issues under GDPR if personal data is exposed. Organizations in sectors such as utilities, transportation, and government agencies are particularly at risk due to their reliance on accurate geospatial information and the strategic importance of their data.

Mitigation Recommendations

To mitigate CVE-2025-10955, organizations should first verify if they are running Netigma version 6.3.5 or earlier versions before 6.3.5 V8 and plan for an upgrade to a patched version once available. In the absence of an official patch, implement strict input validation and output encoding on all user-supplied data, especially HTTP query parameters, to neutralize potentially malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Educate users to avoid clicking on suspicious links and consider deploying web application firewalls (WAFs) with rules to detect and block XSS attack patterns targeting Netigma endpoints. Regularly monitor logs for unusual activity indicative of attempted XSS exploitation. Coordinate with Netcad Software Inc. for updates and security advisories. Finally, conduct security testing and code reviews focusing on input handling in web components to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-09-25T08:35:30.287Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690cb9462a1e959dda2bef56

Added to database: 11/6/2025, 3:05:42 PM

Last enriched: 11/13/2025, 3:53:42 PM

Last updated: 12/21/2025, 8:32:49 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats