CVE-2025-13469: Cross Site Scripting in Public Knowledge Project omp
A security vulnerability has been detected in Public Knowledge Project omp and ojs 3.3.0/3.4.0/3.5.0. Impacted is an unknown function of the file plugins/paymethod/manual/templates/paymentForm.tpl of the component Payment Instructions Setting Handler. The manipulation of the argument manualInstructions leads to cross site scripting. The attack can be initiated remotely. You should upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-13469 identifies a cross-site scripting vulnerability in the Public Knowledge Project's Open Monograph Press (OMP) software, specifically in versions 3.3.0, 3.4.0, and 3.5.0. The vulnerability resides in the paymentForm.tpl template file within the Payment Instructions Setting Handler component. The issue arises from improper handling of the manualInstructions argument, which can be manipulated by an attacker to inject malicious JavaScript code. This XSS flaw allows remote attackers to craft malicious URLs or input that, when viewed by legitimate users, execute arbitrary scripts in their browsers. The attack vector does not require authentication, increasing the exposure risk, but does require user interaction to trigger the payload, such as clicking a malicious link or viewing a compromised page. The impact primarily affects the confidentiality and integrity of user sessions, potentially enabling session hijacking, credential theft, or phishing. The vulnerability does not affect system availability and does not require elevated privileges to exploit. No known exploits have been reported in the wild as of the publication date. The vulnerability has been assigned a CVSS 4.0 base score of 4.8, reflecting its medium severity. The recommended remediation is to upgrade the affected OMP versions to a patched release once available or implement strict input validation and output encoding on the manualInstructions parameter to prevent script injection.
Potential Impact
For European organizations, particularly academic institutions, research centers, and publishers using the Public Knowledge Project's OMP software, this vulnerability poses a risk to user data confidentiality and integrity. Exploitation could lead to session hijacking, allowing attackers to impersonate legitimate users, potentially accessing sensitive academic content or administrative functions. Phishing attacks leveraging this vulnerability could deceive users into divulging credentials or other sensitive information. While the vulnerability does not directly impact system availability, the reputational damage and potential data breaches could have significant consequences. Given the widespread use of OMP in European academic publishing, the threat could affect a broad user base, including researchers, authors, and administrative staff. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation attempts, especially if attackers target institutions with less stringent web security controls. However, the requirement for user interaction somewhat limits the attack's scope. Organizations failing to address this vulnerability may face compliance issues with data protection regulations such as GDPR if user data is compromised.
Mitigation Recommendations
Organizations should prioritize upgrading their OMP installations to versions beyond 3.5.0 once the vendor releases a patch addressing CVE-2025-13469. Until an official patch is available, administrators should implement strict input validation and output encoding on the manualInstructions parameter to neutralize malicious script injections. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. Regularly auditing and monitoring web application logs for suspicious activities related to payment instructions can help detect exploitation attempts early. User education is also critical; training users to recognize phishing attempts and avoid clicking on suspicious links reduces the risk of successful exploitation. Additionally, deploying web application firewalls (WAFs) with rules targeting XSS payloads can provide an additional layer of defense. Finally, organizations should review and harden their overall web security posture, including secure coding practices and periodic vulnerability assessments, to prevent similar issues.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-13469: Cross Site Scripting in Public Knowledge Project omp
Description
A security vulnerability has been detected in Public Knowledge Project omp and ojs 3.3.0/3.4.0/3.5.0. Impacted is an unknown function of the file plugins/paymethod/manual/templates/paymentForm.tpl of the component Payment Instructions Setting Handler. The manipulation of the argument manualInstructions leads to cross site scripting. The attack can be initiated remotely. You should upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-13469 identifies a cross-site scripting vulnerability in the Public Knowledge Project's Open Monograph Press (OMP) software, specifically in versions 3.3.0, 3.4.0, and 3.5.0. The vulnerability resides in the paymentForm.tpl template file within the Payment Instructions Setting Handler component. The issue arises from improper handling of the manualInstructions argument, which can be manipulated by an attacker to inject malicious JavaScript code. This XSS flaw allows remote attackers to craft malicious URLs or input that, when viewed by legitimate users, execute arbitrary scripts in their browsers. The attack vector does not require authentication, increasing the exposure risk, but does require user interaction to trigger the payload, such as clicking a malicious link or viewing a compromised page. The impact primarily affects the confidentiality and integrity of user sessions, potentially enabling session hijacking, credential theft, or phishing. The vulnerability does not affect system availability and does not require elevated privileges to exploit. No known exploits have been reported in the wild as of the publication date. The vulnerability has been assigned a CVSS 4.0 base score of 4.8, reflecting its medium severity. The recommended remediation is to upgrade the affected OMP versions to a patched release once available or implement strict input validation and output encoding on the manualInstructions parameter to prevent script injection.
Potential Impact
For European organizations, particularly academic institutions, research centers, and publishers using the Public Knowledge Project's OMP software, this vulnerability poses a risk to user data confidentiality and integrity. Exploitation could lead to session hijacking, allowing attackers to impersonate legitimate users, potentially accessing sensitive academic content or administrative functions. Phishing attacks leveraging this vulnerability could deceive users into divulging credentials or other sensitive information. While the vulnerability does not directly impact system availability, the reputational damage and potential data breaches could have significant consequences. Given the widespread use of OMP in European academic publishing, the threat could affect a broad user base, including researchers, authors, and administrative staff. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation attempts, especially if attackers target institutions with less stringent web security controls. However, the requirement for user interaction somewhat limits the attack's scope. Organizations failing to address this vulnerability may face compliance issues with data protection regulations such as GDPR if user data is compromised.
Mitigation Recommendations
Organizations should prioritize upgrading their OMP installations to versions beyond 3.5.0 once the vendor releases a patch addressing CVE-2025-13469. Until an official patch is available, administrators should implement strict input validation and output encoding on the manualInstructions parameter to neutralize malicious script injections. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. Regularly auditing and monitoring web application logs for suspicious activities related to payment instructions can help detect exploitation attempts early. User education is also critical; training users to recognize phishing attempts and avoid clicking on suspicious links reduces the risk of successful exploitation. Additionally, deploying web application firewalls (WAFs) with rules targeting XSS payloads can provide an additional layer of defense. Finally, organizations should review and harden their overall web security posture, including secure coding practices and periodic vulnerability assessments, to prevent similar issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-20T07:04:14.906Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691f1de63e6177767e7f6c71
Added to database: 11/20/2025, 1:55:50 PM
Last enriched: 11/27/2025, 2:43:45 PM
Last updated: 1/7/2026, 4:20:26 AM
Views: 103
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.