Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11884: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenText™ uCMDB

0
Low
VulnerabilityCVE-2025-11884cvecve-2025-11884cwe-79
Published: Wed Nov 19 2025 (11/19/2025, 21:13:48 UTC)
Source: CVE Database V5
Vendor/Project: OpenText™
Product: uCMDB

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in opentext uCMDB allows Stored XSS. The vulnerability could allow an attacker has high level access to UCMDB to create or update data with malicious scripts This issue affects uCMDB: 24.4.

AI-Powered Analysis

AILast updated: 11/19/2025, 21:38:13 UTC

Technical Analysis

CVE-2025-11884 is a stored Cross-site Scripting (XSS) vulnerability identified in OpenText uCMDB version 24.4. The root cause is improper neutralization of input during web page generation, classified under CWE-79. This vulnerability allows an attacker with at least low-level privileges within the uCMDB environment to create or update data containing malicious scripts that are stored and later executed in the context of other users viewing the affected data. The vulnerability does not require user interaction to trigger the script execution once the malicious payload is stored. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability, resulting in an overall low severity score of 2.3. The vulnerability's impact is primarily on confidentiality due to potential session hijacking or unauthorized actions performed via the injected script. No public exploits or active exploitation have been reported yet. The vulnerability affects only version 24.4 of uCMDB, and no patches have been linked yet, indicating the need for vendor-provided fixes or workarounds. Given that uCMDB is used for configuration management and IT asset tracking, exploitation could lead to unauthorized data exposure or manipulation within enterprise environments.

Potential Impact

For European organizations, the impact of CVE-2025-11884 can range from limited to moderate depending on the deployment context of OpenText uCMDB. Since uCMDB is often used in IT service management and configuration management databases, exploitation could allow attackers to inject malicious scripts that execute in the context of administrative or operational users. This could lead to session hijacking, unauthorized data access, or manipulation of configuration data, potentially disrupting IT operations or exposing sensitive information. Organizations in sectors with stringent regulatory requirements such as finance, healthcare, and critical infrastructure may face compliance risks if such vulnerabilities are exploited. The low CVSS score reflects the requirement for some level of privilege and high attack complexity, reducing the likelihood of widespread exploitation. However, the stored nature of the XSS means that once injected, the malicious payload can affect multiple users over time, increasing risk in environments with many users accessing uCMDB data. The absence of known exploits in the wild currently limits immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

1. Restrict user privileges within uCMDB to the minimum necessary, especially limiting write or update permissions to trusted administrators only. 2. Implement strict input validation and output encoding on all user-supplied data fields within uCMDB to prevent injection of malicious scripts. 3. Monitor logs and audit trails for unusual data changes or script injections. 4. Apply vendor patches promptly once available; engage with OpenText support for any interim fixes or recommended configurations. 5. Use web application firewalls (WAFs) with custom rules to detect and block suspicious script payloads targeting uCMDB interfaces. 6. Educate administrators and users about the risks of stored XSS and encourage reporting of anomalous behavior. 7. Consider isolating uCMDB access to trusted networks and enforce multi-factor authentication to reduce risk of compromised accounts. 8. Regularly review and update security policies related to configuration management tools to include XSS threat awareness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
OpenText
Date Reserved
2025-10-16T17:50:24.435Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691e365f4e81ab18fb53789d

Added to database: 11/19/2025, 9:27:59 PM

Last enriched: 11/19/2025, 9:38:13 PM

Last updated: 11/19/2025, 10:33:13 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats