Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11291: Cross Site Scripting in ixmaps website2017

0
Medium
VulnerabilityCVE-2025-11291cvecve-2025-11291
Published: Sun Oct 05 2025 (10/05/2025, 13:32:05 UTC)
Source: CVE Database V5
Vendor/Project: ixmaps
Product: website2017

Description

A security flaw has been discovered in ixmaps website2017 up to 0c71cffa0162186bc057a76766bc97e9f5a3a2d0. This impacts an unknown function of the file /map.php of the component HTTP GET Request Handler. Performing manipulation of the argument trid results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/05/2025, 13:43:01 UTC

Technical Analysis

CVE-2025-11291 is a cross-site scripting (XSS) vulnerability identified in the ixmaps website2017 product, specifically affecting the /map.php file's HTTP GET request handler. The vulnerability arises from improper sanitization or validation of the 'trid' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary scripts in the context of the victim's browser without requiring authentication. The vulnerability has been publicly disclosed, and an exploit is available, increasing the risk of exploitation. The product uses continuous delivery with rolling releases, complicating the identification of affected versions and patches, and the vendor has not responded to the disclosure, leaving users without official remediation guidance. The CVSS v4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity and availability to a limited extent but not confidentiality. The vulnerability could be leveraged to conduct phishing, session hijacking, or other client-side attacks against users interacting with the vulnerable web application.

Potential Impact

For European organizations using ixmaps website2017, this vulnerability poses a moderate risk. Exploitation could lead to the compromise of user sessions, theft of sensitive information such as cookies or tokens, and potential defacement or manipulation of web content. This can damage organizational reputation, lead to regulatory scrutiny under GDPR if personal data is compromised, and disrupt services relying on the affected web application. Since the vulnerability is remotely exploitable without authentication, attackers can target any user accessing the vulnerable site, increasing the attack surface. The lack of vendor response and unclear patch availability may prolong exposure. Organizations in sectors with high reliance on web mapping or geospatial services, such as urban planning, transportation, or environmental monitoring, may face operational disruptions or data integrity issues.

Mitigation Recommendations

Organizations should immediately audit their deployments of ixmaps website2017 to identify if they are running affected versions. Given the absence of official patches, implement web application firewall (WAF) rules specifically targeting suspicious payloads in the 'trid' parameter to block potential XSS attack vectors. Employ input validation and output encoding at the application level as a compensating control if source code access is available. Educate users about the risks of clicking suspicious links and encourage the use of modern browsers with built-in XSS protections. Monitor web server logs for unusual GET requests containing script tags or encoded payloads targeting 'trid'. Consider isolating or restricting access to the vulnerable web application until a vendor patch or update is available. Engage with the vendor or community forums for updates or unofficial patches. Finally, implement Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-04T18:36:39.599Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e274eea08882725d27c484

Added to database: 10/5/2025, 1:38:54 PM

Last enriched: 10/5/2025, 1:43:01 PM

Last updated: 10/7/2025, 8:39:28 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats