CVE-2025-11360: Cross Site Scripting in jakowenko double-take
A vulnerability was detected in jakowenko double-take up to 1.13.1. The impacted element is the function app.use of the file api/src/app.js of the component API. The manipulation of the argument X-Ingress-Path results in cross site scripting. The attack can be executed remotely. Upgrading to version 1.13.2 is sufficient to resolve this issue. The patch is identified as e11de9dd6b4ea6b7ec9a5607a920d48961e9fa50. The affected component should be upgraded.
AI Analysis
Technical Summary
CVE-2025-11360 is a cross-site scripting vulnerability identified in the jakowenko double-take product, specifically affecting versions 1.13.0 and 1.13.1. The vulnerability arises from improper sanitization of the X-Ingress-Path HTTP header within the API component's app.use function located in api/src/app.js. This flaw allows an attacker to craft a malicious X-Ingress-Path header that injects executable script code into the web application's response. Since the attack vector is remote and does not require authentication, any user accessing the vulnerable application with a manipulated header could execute arbitrary JavaScript in their browser context. The vulnerability impacts the confidentiality and integrity of user sessions by enabling theft of cookies, session tokens, or performing actions on behalf of the user. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the ease of exploitation (no privileges or authentication needed) but requiring user interaction to trigger the payload. The vulnerability is resolved by upgrading to version 1.13.2, which includes a patch identified by commit e11de9dd6b4ea6b7ec9a5607a920d48961e9fa50. No public exploits have been reported yet, but the presence of this vulnerability in an API component suggests potential for targeted phishing or social engineering attacks leveraging the XSS flaw.
Potential Impact
For European organizations, the primary impact of CVE-2025-11360 lies in the potential compromise of user data and session integrity through client-side script injection. This could lead to theft of sensitive information, unauthorized actions performed in the context of authenticated users, and reputational damage if exploited. Organizations relying on jakowenko double-take for API services or web applications may face increased risk of targeted attacks, especially if their user base includes high-value or sensitive profiles. The vulnerability could be leveraged in spear-phishing campaigns or combined with other attack vectors to escalate privileges or move laterally within networks. Given the medium severity and the requirement for user interaction, the risk is moderate but non-negligible, particularly for sectors with stringent data protection requirements such as finance, healthcare, and government. Failure to patch could also result in non-compliance with GDPR mandates on data security and breach prevention.
Mitigation Recommendations
The definitive mitigation is to upgrade jakowenko double-take to version 1.13.2 or later, which contains the official patch addressing the XSS vulnerability. Organizations should audit their deployments to identify any instances running affected versions 1.13.0 or 1.13.1 and prioritize patching. Additionally, implementing strict input validation and sanitization on HTTP headers, especially X-Ingress-Path, can reduce risk. Web application firewalls (WAFs) should be configured to detect and block suspicious header manipulations. Security teams should also educate users about the risks of interacting with untrusted links or content that could trigger XSS attacks. Monitoring logs for anomalous header values and unusual user activity can help detect exploitation attempts. Finally, adopting Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting script execution contexts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-11360: Cross Site Scripting in jakowenko double-take
Description
A vulnerability was detected in jakowenko double-take up to 1.13.1. The impacted element is the function app.use of the file api/src/app.js of the component API. The manipulation of the argument X-Ingress-Path results in cross site scripting. The attack can be executed remotely. Upgrading to version 1.13.2 is sufficient to resolve this issue. The patch is identified as e11de9dd6b4ea6b7ec9a5607a920d48961e9fa50. The affected component should be upgraded.
AI-Powered Analysis
Technical Analysis
CVE-2025-11360 is a cross-site scripting vulnerability identified in the jakowenko double-take product, specifically affecting versions 1.13.0 and 1.13.1. The vulnerability arises from improper sanitization of the X-Ingress-Path HTTP header within the API component's app.use function located in api/src/app.js. This flaw allows an attacker to craft a malicious X-Ingress-Path header that injects executable script code into the web application's response. Since the attack vector is remote and does not require authentication, any user accessing the vulnerable application with a manipulated header could execute arbitrary JavaScript in their browser context. The vulnerability impacts the confidentiality and integrity of user sessions by enabling theft of cookies, session tokens, or performing actions on behalf of the user. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the ease of exploitation (no privileges or authentication needed) but requiring user interaction to trigger the payload. The vulnerability is resolved by upgrading to version 1.13.2, which includes a patch identified by commit e11de9dd6b4ea6b7ec9a5607a920d48961e9fa50. No public exploits have been reported yet, but the presence of this vulnerability in an API component suggests potential for targeted phishing or social engineering attacks leveraging the XSS flaw.
Potential Impact
For European organizations, the primary impact of CVE-2025-11360 lies in the potential compromise of user data and session integrity through client-side script injection. This could lead to theft of sensitive information, unauthorized actions performed in the context of authenticated users, and reputational damage if exploited. Organizations relying on jakowenko double-take for API services or web applications may face increased risk of targeted attacks, especially if their user base includes high-value or sensitive profiles. The vulnerability could be leveraged in spear-phishing campaigns or combined with other attack vectors to escalate privileges or move laterally within networks. Given the medium severity and the requirement for user interaction, the risk is moderate but non-negligible, particularly for sectors with stringent data protection requirements such as finance, healthcare, and government. Failure to patch could also result in non-compliance with GDPR mandates on data security and breach prevention.
Mitigation Recommendations
The definitive mitigation is to upgrade jakowenko double-take to version 1.13.2 or later, which contains the official patch addressing the XSS vulnerability. Organizations should audit their deployments to identify any instances running affected versions 1.13.0 or 1.13.1 and prioritize patching. Additionally, implementing strict input validation and sanitization on HTTP headers, especially X-Ingress-Path, can reduce risk. Web application firewalls (WAFs) should be configured to detect and block suspicious header manipulations. Security teams should also educate users about the risks of interacting with untrusted links or content that could trigger XSS attacks. Monitoring logs for anomalous header values and unusual user activity can help detect exploitation attempts. Finally, adopting Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting script execution contexts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-06T06:43:54.373Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e4da266ce4090a3e7d70a9
Added to database: 10/7/2025, 9:15:18 AM
Last enriched: 10/7/2025, 9:15:36 AM
Last updated: 10/7/2025, 12:06:26 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11389: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-0603: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Callvision Healthcare Callvision Emergency Code
CriticalCVE-2025-11388: Stack-based Buffer Overflow in Tenda AC15
HighSecurity Firm Exposes Role of Beijing Research Institute in China’s Cyber Operations
MediumCVE-2025-11387: Stack-based Buffer Overflow in Tenda AC15
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.