Skip to main content

CVE-2025-1419: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Proget Proget

Low
VulnerabilityCVE-2025-1419cvecve-2025-1419cwe-79
Published: Wed May 21 2025 (05/21/2025, 13:03:56 UTC)
Source: CVE
Vendor/Project: Proget
Product: Proget

Description

Input provided in comment section of Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).

AI-Powered Analysis

AILast updated: 07/06/2025, 05:26:08 UTC

Technical Analysis

CVE-2025-1419 is a vulnerability classified under CWE-79, indicating an improper neutralization of input during web page generation, commonly known as Cross-Site Scripting (XSS). This specific vulnerability affects the Konsola Proget component of the Proget product, which is part of a Mobile Device Management (MDM) suite. The issue arises from insufficient sanitization of user input in the comment section, allowing a high-privileged user to inject malicious scripts that are stored and later executed in the context of other users viewing the comments. This stored XSS can lead to session hijacking, unauthorized actions, or the execution of arbitrary code within the victim's browser session. The vulnerability requires a high-privileged user to input the malicious payload and some user interaction to trigger the script execution, which limits the attack vector. The vulnerability has a CVSS 4.0 base score of 2.4, indicating a low severity primarily due to the requirement of high privileges and user interaction, as well as the limited impact on confidentiality, integrity, and availability. The issue was addressed and fixed in version 2.17.5 of Konsola Proget. No known exploits are reported in the wild as of the publication date. The vulnerability's attack vector is adjacent network (AV:A), meaning the attacker must have access to the same network segment or system environment to exploit it. The vulnerability does not affect confidentiality, integrity, or availability directly but poses a risk of session hijacking or unauthorized actions through the browser context of affected users.

Potential Impact

For European organizations using Proget's Konsola Proget MDM suite, this vulnerability could allow a high-privileged insider or attacker with elevated access to inject malicious scripts into the comment sections. Although the CVSS score is low, the impact could be significant in environments where sensitive device management operations are performed via the MDM console. Exploitation could lead to unauthorized actions performed on behalf of other users, potentially compromising device configurations or exposing sensitive operational data. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate insider threat risks. Organizations in regulated sectors such as finance, healthcare, and critical infrastructure in Europe could face compliance and operational risks if such an attack occurs. The vulnerability could also be leveraged as part of a multi-stage attack chain, increasing its potential impact in targeted attacks.

Mitigation Recommendations

European organizations should ensure that all instances of Konsola Proget are updated to version 2.17.5 or later, where the vulnerability is patched. Beyond patching, organizations should implement strict access controls to limit high-privileged user accounts and monitor their activities closely. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regular security training for administrators and users with elevated privileges is recommended to recognize and avoid social engineering attempts that could facilitate exploitation. Additionally, organizations should audit comment and input fields for proper sanitization and consider implementing web application firewalls (WAFs) with rules tailored to detect and block XSS payloads. Logging and alerting on unusual comment activity or script injections can provide early detection of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-02-18T13:43:48.880Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682dd047c4522896dcbfd71c

Added to database: 5/21/2025, 1:08:23 PM

Last enriched: 7/6/2025, 5:26:08 AM

Last updated: 7/31/2025, 6:56:36 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats