Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ObjectPlanet Opinio

0
Medium
VulnerabilityCVE-2025-13873cvecve-2025-13873cwe-79
Published: Tue Dec 02 2025 (12/02/2025, 09:56:16 UTC)
Source: CVE Database V5
Vendor/Project: ObjectPlanet
Product: Opinio

Description

Stored Cross-Site Scripting (XSS) in the survey-import feature of ObjectPlanet Opinio 7.26 rev12562 on web application allows an attacker to inject arbitrary JavaScript code, which executes in the browsing context of any visitor accessing the compromised survey.

AI-Powered Analysis

AILast updated: 12/09/2025, 10:55:13 UTC

Technical Analysis

CVE-2025-13873 identifies a stored Cross-Site Scripting (XSS) vulnerability in ObjectPlanet Opinio version 7.26 rev12562, a web-based survey application. The vulnerability resides in the survey-import feature, where insufficient input neutralization allows an attacker to embed malicious JavaScript code into survey data. When a user accesses the compromised survey, the injected script executes within their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is classified under CWE-79, highlighting improper neutralization of input during web page generation. The CVSS 4.0 vector indicates the attack can be performed remotely without authentication (AV:N), with low attack complexity (AC:L), but requires user interaction (UI:P) and high privileges (PR:H) to inject the payload. The impact on confidentiality and integrity is low, and no availability impact is noted. No patches or public exploits are currently available, but the vulnerability's presence in a widely used survey tool poses a risk for organizations relying on Opinio for data collection and analysis. Attackers with access to the import feature can leverage this flaw to compromise end users who view the infected surveys, potentially leading to broader network compromise or data leakage.

Potential Impact

For European organizations, this vulnerability can lead to client-side attacks targeting employees, customers, or partners who access compromised surveys. The injection of malicious scripts can result in theft of session cookies, redirection to phishing sites, or execution of unauthorized commands within the user's browser context. This can undermine trust in survey data integrity and confidentiality, especially in sectors such as market research, healthcare, and public administration where Opinio is used. Although the vulnerability requires high privileges to inject malicious content, insider threats or compromised accounts could exploit it. The medium severity rating reflects limited direct impact on core systems but significant risk to user data and organizational reputation. Additionally, the lack of available patches increases the window of exposure. Organizations handling sensitive survey data or relying on Opinio for decision-making should consider this a moderate risk that could escalate if exploited in targeted campaigns.

Mitigation Recommendations

To mitigate CVE-2025-13873, organizations should first restrict access to the survey-import feature to trusted administrators only, minimizing the risk of malicious input injection. Implement strict input validation and sanitization on all imported survey data to neutralize potentially harmful scripts before rendering. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Monitor survey content regularly for unexpected or suspicious code injections. If possible, upgrade to a patched version of ObjectPlanet Opinio once available. In the interim, consider isolating the survey application environment and limiting user privileges to reduce the impact of any successful exploitation. Educate users about the risks of interacting with untrusted survey content and encourage reporting of unusual behavior. Finally, maintain robust logging and alerting to detect attempts to exploit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TCS-CERT
Date Reserved
2025-12-02T09:17:07.251Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692ebbcb5ae7112264a69121

Added to database: 12/2/2025, 10:13:31 AM

Last enriched: 12/9/2025, 10:55:13 AM

Last updated: 2/5/2026, 9:24:56 PM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats