CVE-2025-13672: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenText™ Web Site Management Server
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText™ Web Site Management Server allows Reflected XSS. The vulnerability could allow injecting malicious JavaScript inside URL parameters that was then rendered with the preview of the page, so that malicious scripts could be executed on the client side. This issue affects Web Site Management Server: 16.7.0, 16.7.1.
AI Analysis
Technical Summary
CVE-2025-13672 is a reflected Cross-site Scripting (XSS) vulnerability identified in OpenText Web Site Management Server versions 16.7.0 and 16.7.1. The root cause is improper neutralization of user-supplied input during the generation of web pages, specifically in the preview functionality where URL parameters are rendered without adequate sanitization. This flaw allows an attacker to craft malicious URLs containing JavaScript payloads that execute in the context of the victim's browser when the preview page is accessed. The vulnerability is classified under CWE-79, indicating failure to properly sanitize input leading to script injection. The CVSS 4.0 base score is 7.0, reflecting high severity due to network attack vector, low attack complexity, partial user interaction, and significant impact on confidentiality and integrity. The vulnerability does not require authentication but does require some user interaction (clicking a malicious link). The scope is partial, affecting only the Web Site Management Server component. No public exploits have been reported yet, but the nature of reflected XSS makes it a common and exploitable attack vector. This vulnerability could be leveraged for session hijacking, credential theft, or delivering further malware via client-side script execution.
Potential Impact
The primary impact of CVE-2025-13672 is the execution of arbitrary JavaScript code in the context of the victim's browser, which can lead to theft of sensitive information such as session cookies, credentials, or other data accessible to the browser. This can compromise user confidentiality and integrity. Additionally, attackers could perform actions on behalf of the user or redirect users to malicious sites. For organizations, this can result in data breaches, loss of user trust, and potential regulatory penalties. Since the vulnerability affects a web content management system, it may impact websites managed by affected organizations, potentially exposing their user base to attacks. The requirement for user interaction (clicking a malicious link) somewhat limits the attack surface but does not eliminate risk, especially in phishing scenarios. The lack of known exploits in the wild suggests the threat is currently theoretical but should be treated proactively given the ease of exploitation and high impact.
Mitigation Recommendations
Organizations should immediately assess their use of OpenText Web Site Management Server versions 16.7.0 and 16.7.1 and plan to upgrade to a patched version once available. In the absence of patches, implement strict input validation and output encoding on all user-supplied data, especially URL parameters rendered in previews. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of XSS attacks. Educate users to be cautious with unsolicited links and implement web application firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting the affected endpoints. Regularly audit web application logs for suspicious URL patterns. Additionally, disable or restrict the preview functionality if it is not essential, or isolate it behind authentication and access controls to reduce exposure. Monitor vendor advisories for updates and apply security patches promptly.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Netherlands, Japan, India, Brazil
CVE-2025-13672: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenText™ Web Site Management Server
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText™ Web Site Management Server allows Reflected XSS. The vulnerability could allow injecting malicious JavaScript inside URL parameters that was then rendered with the preview of the page, so that malicious scripts could be executed on the client side. This issue affects Web Site Management Server: 16.7.0, 16.7.1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13672 is a reflected Cross-site Scripting (XSS) vulnerability identified in OpenText Web Site Management Server versions 16.7.0 and 16.7.1. The root cause is improper neutralization of user-supplied input during the generation of web pages, specifically in the preview functionality where URL parameters are rendered without adequate sanitization. This flaw allows an attacker to craft malicious URLs containing JavaScript payloads that execute in the context of the victim's browser when the preview page is accessed. The vulnerability is classified under CWE-79, indicating failure to properly sanitize input leading to script injection. The CVSS 4.0 base score is 7.0, reflecting high severity due to network attack vector, low attack complexity, partial user interaction, and significant impact on confidentiality and integrity. The vulnerability does not require authentication but does require some user interaction (clicking a malicious link). The scope is partial, affecting only the Web Site Management Server component. No public exploits have been reported yet, but the nature of reflected XSS makes it a common and exploitable attack vector. This vulnerability could be leveraged for session hijacking, credential theft, or delivering further malware via client-side script execution.
Potential Impact
The primary impact of CVE-2025-13672 is the execution of arbitrary JavaScript code in the context of the victim's browser, which can lead to theft of sensitive information such as session cookies, credentials, or other data accessible to the browser. This can compromise user confidentiality and integrity. Additionally, attackers could perform actions on behalf of the user or redirect users to malicious sites. For organizations, this can result in data breaches, loss of user trust, and potential regulatory penalties. Since the vulnerability affects a web content management system, it may impact websites managed by affected organizations, potentially exposing their user base to attacks. The requirement for user interaction (clicking a malicious link) somewhat limits the attack surface but does not eliminate risk, especially in phishing scenarios. The lack of known exploits in the wild suggests the threat is currently theoretical but should be treated proactively given the ease of exploitation and high impact.
Mitigation Recommendations
Organizations should immediately assess their use of OpenText Web Site Management Server versions 16.7.0 and 16.7.1 and plan to upgrade to a patched version once available. In the absence of patches, implement strict input validation and output encoding on all user-supplied data, especially URL parameters rendered in previews. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of XSS attacks. Educate users to be cautious with unsolicited links and implement web application firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting the affected endpoints. Regularly audit web application logs for suspicious URL patterns. Additionally, disable or restrict the preview functionality if it is not essential, or isolate it behind authentication and access controls to reduce exposure. Monitor vendor advisories for updates and apply security patches promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- OpenText
- Date Reserved
- 2025-11-25T17:03:44.542Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6997966bd7880ec89b39b1c0
Added to database: 2/19/2026, 11:02:03 PM
Last enriched: 2/28/2026, 12:47:32 PM
Last updated: 4/5/2026, 12:27:50 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.