CVE-2025-11682: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Perx Technologies Customer Engagement & Loyalty Platform
Stored cross-site scripting (XSS) vulnerability in the LMT Dashboard of the Perx Customer Engagement & Loyalty Platform allows an authenticated attacker to execute arbitrary JavaScript code in a victim's browser. The vulnerability is due to improper sanitization of SVG file uploads. An attacker can upload a malicious SVG file containing a script payload to a campaign. When another user views this image on the public LMT microsite, the script executes, which can lead to session hijacking, data theft, or other unauthorized actions.This issue affects Customer Engagement & Loyalty Platform before 4.617.4.
AI Analysis
Technical Summary
CVE-2025-11682 is a stored cross-site scripting vulnerability classified under CWE-79 and CWE-83, found in the Perx Technologies Customer Engagement & Loyalty Platform, particularly in the LMT Dashboard component. The vulnerability stems from insufficient sanitization of SVG file uploads, which are vector image files that can contain embedded scripts. An authenticated attacker with high privileges can upload a crafted SVG containing malicious JavaScript code as part of a campaign. When other users, including potentially less privileged or public users, view this SVG on the public-facing LMT microsite, the embedded script executes in their browser context. This execution can lead to session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of the victim. The vulnerability affects all versions before 4.617.4. The CVSS 4.0 vector indicates that the attack requires authentication with high privileges, user interaction, and has a high impact on confidentiality, integrity, and availability, but the attack complexity is high and the scope is high, meaning the vulnerability can affect components beyond the initially vulnerable module. No patches are linked yet, and no known exploits have been observed in the wild. The issue was reserved and published in October 2025 by NCSC.ch, reflecting a recent disclosure. This vulnerability highlights the risks of improper input validation and the dangers of allowing SVG uploads without adequate sanitization in web applications.
Potential Impact
For European organizations using the Perx Customer Engagement & Loyalty Platform, this vulnerability poses significant risks. Exploitation could lead to compromise of user sessions, allowing attackers to impersonate legitimate users and access sensitive customer data or internal campaign information. This could result in data breaches, loss of customer trust, and regulatory penalties under GDPR due to unauthorized data exposure. The public-facing nature of the LMT microsite increases the attack surface, potentially affecting a wide range of users including customers and employees. Additionally, attackers could leverage the vulnerability to perform further attacks within the network, impacting system integrity and availability. The requirement for high privilege authentication limits the attack vector primarily to insiders or compromised accounts, but the consequences remain severe. The high impact on confidentiality, integrity, and availability underscores the critical need for remediation in European markets where data protection regulations are stringent and customer engagement platforms are widely used.
Mitigation Recommendations
European organizations should immediately verify their Perx Customer Engagement & Loyalty Platform version and upgrade to version 4.617.4 or later once available. Until patches are applied, implement strict file upload controls to restrict SVG uploads or convert SVGs to safer formats server-side. Employ robust input sanitization and validation libraries specifically designed to neutralize script content within SVG files. Enforce the principle of least privilege to limit user permissions, reducing the risk of high-privilege account compromise. Monitor logs for unusual file upload activity and anomalous behavior on the LMT microsite. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block malicious SVG payloads. Conduct regular security training for administrators to recognize phishing or social engineering attempts that could lead to credential compromise. Finally, perform thorough security assessments and penetration tests focusing on file upload functionalities and cross-site scripting vectors within the platform.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Italy, Spain
CVE-2025-11682: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Perx Technologies Customer Engagement & Loyalty Platform
Description
Stored cross-site scripting (XSS) vulnerability in the LMT Dashboard of the Perx Customer Engagement & Loyalty Platform allows an authenticated attacker to execute arbitrary JavaScript code in a victim's browser. The vulnerability is due to improper sanitization of SVG file uploads. An attacker can upload a malicious SVG file containing a script payload to a campaign. When another user views this image on the public LMT microsite, the script executes, which can lead to session hijacking, data theft, or other unauthorized actions.This issue affects Customer Engagement & Loyalty Platform before 4.617.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-11682 is a stored cross-site scripting vulnerability classified under CWE-79 and CWE-83, found in the Perx Technologies Customer Engagement & Loyalty Platform, particularly in the LMT Dashboard component. The vulnerability stems from insufficient sanitization of SVG file uploads, which are vector image files that can contain embedded scripts. An authenticated attacker with high privileges can upload a crafted SVG containing malicious JavaScript code as part of a campaign. When other users, including potentially less privileged or public users, view this SVG on the public-facing LMT microsite, the embedded script executes in their browser context. This execution can lead to session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of the victim. The vulnerability affects all versions before 4.617.4. The CVSS 4.0 vector indicates that the attack requires authentication with high privileges, user interaction, and has a high impact on confidentiality, integrity, and availability, but the attack complexity is high and the scope is high, meaning the vulnerability can affect components beyond the initially vulnerable module. No patches are linked yet, and no known exploits have been observed in the wild. The issue was reserved and published in October 2025 by NCSC.ch, reflecting a recent disclosure. This vulnerability highlights the risks of improper input validation and the dangers of allowing SVG uploads without adequate sanitization in web applications.
Potential Impact
For European organizations using the Perx Customer Engagement & Loyalty Platform, this vulnerability poses significant risks. Exploitation could lead to compromise of user sessions, allowing attackers to impersonate legitimate users and access sensitive customer data or internal campaign information. This could result in data breaches, loss of customer trust, and regulatory penalties under GDPR due to unauthorized data exposure. The public-facing nature of the LMT microsite increases the attack surface, potentially affecting a wide range of users including customers and employees. Additionally, attackers could leverage the vulnerability to perform further attacks within the network, impacting system integrity and availability. The requirement for high privilege authentication limits the attack vector primarily to insiders or compromised accounts, but the consequences remain severe. The high impact on confidentiality, integrity, and availability underscores the critical need for remediation in European markets where data protection regulations are stringent and customer engagement platforms are widely used.
Mitigation Recommendations
European organizations should immediately verify their Perx Customer Engagement & Loyalty Platform version and upgrade to version 4.617.4 or later once available. Until patches are applied, implement strict file upload controls to restrict SVG uploads or convert SVGs to safer formats server-side. Employ robust input sanitization and validation libraries specifically designed to neutralize script content within SVG files. Enforce the principle of least privilege to limit user permissions, reducing the risk of high-privilege account compromise. Monitor logs for unusual file upload activity and anomalous behavior on the LMT microsite. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block malicious SVG payloads. Conduct regular security training for administrators to recognize phishing or social engineering attempts that could lead to credential compromise. Finally, perform thorough security assessments and penetration tests focusing on file upload functionalities and cross-site scripting vectors within the platform.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- NCSC.ch
- Date Reserved
- 2025-10-13T12:22:34.611Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff22703fb824cb8cdada05
Added to database: 10/27/2025, 7:42:40 AM
Last enriched: 10/27/2025, 7:43:06 AM
Last updated: 10/30/2025, 4:59:58 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
CriticalCVE-2024-2961: CWE-787 Out-of-bounds Write in The GNU C Library glibc
HighCVE-2025-12475: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativethemeshq Blocksy Companion
MediumCVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.