Skip to main content

CVE-2025-11137: Cross Site Scripting in Gstarsoft GstarCAD

Medium
VulnerabilityCVE-2025-11137cvecve-2025-11137
Published: Mon Sep 29 2025 (09/29/2025, 02:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Gstarsoft
Product: GstarCAD

Description

A vulnerability has been found in Gstarsoft GstarCAD up to 9.4.0. This affects an unknown function of the component File Renaming Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Applying a patch is the recommended action to fix this issue.

AI-Powered Analysis

AILast updated: 09/29/2025, 12:33:11 UTC

Technical Analysis

CVE-2025-11137 is a cross-site scripting (XSS) vulnerability identified in Gstarsoft's GstarCAD software versions up to 9.4.0. The vulnerability resides in an unspecified function within the File Renaming Handler component. This flaw allows an attacker to inject malicious scripts that execute in the context of the victim's browser when interacting with the affected component. The attack vector is remote, requiring no prior authentication, but user interaction is necessary to trigger the malicious script. The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vulnerability can lead to partial integrity and confidentiality impacts, such as session hijacking, unauthorized actions performed on behalf of the user, or theft of sensitive information accessible via the browser session. The vulnerability does not affect availability and does not require elevated privileges to exploit. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The recommended remediation is to apply the vendor-supplied patch once available to eliminate the vulnerability. Until patched, users should exercise caution when interacting with untrusted content or files within GstarCAD's file renaming functionality.

Potential Impact

For European organizations using GstarCAD, particularly those in architecture, engineering, and construction sectors where CAD software is critical, this vulnerability poses a risk of client-side attacks that can compromise user sessions and data confidentiality. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the affected user's session, potentially leading to credential theft, unauthorized access to project files, or manipulation of CAD data. This could disrupt workflows, lead to intellectual property theft, or facilitate further attacks within the corporate network. Given that GstarCAD is used in multiple European countries, organizations relying on this software must consider the risk of targeted attacks exploiting this vulnerability, especially in environments where users frequently rename files or interact with shared project files remotely.

Mitigation Recommendations

1. Apply the official patch from Gstarsoft immediately upon release to remediate the vulnerability. 2. Implement strict input validation and sanitization on any user-controllable inputs related to file renaming or other components exposed to user input within GstarCAD. 3. Employ Content Security Policy (CSP) headers where possible to restrict the execution of unauthorized scripts in the application context. 4. Educate users to avoid interacting with suspicious or unexpected file rename prompts or links within the software. 5. Monitor network and application logs for unusual activity related to file renaming operations or script execution attempts. 6. If patching is delayed, consider isolating GstarCAD usage to trusted networks and users to reduce exposure. 7. Coordinate with IT security teams to ensure endpoint protection solutions are updated to detect potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-28T18:27:11.892Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68da7c77bcc355985f2b5cec

Added to database: 9/29/2025, 12:32:55 PM

Last enriched: 9/29/2025, 12:33:11 PM

Last updated: 9/29/2025, 6:22:57 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats