CVE-2025-1420: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Proget Proget
Input provided in a field containing "activationMessage" in Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).
AI Analysis
Technical Summary
CVE-2025-1420 is a vulnerability classified under CWE-79, which pertains to Improper Neutralization of Input During Web Page Generation, commonly known as Cross-Site Scripting (XSS). This specific vulnerability affects the Konsola Proget component of the Proget MDM suite. The issue arises because input provided in a field named "activationMessage" is not properly sanitized. This improper input validation allows a high-privileged user to inject malicious scripts that are stored persistently within the application. When other users or the same user access the affected page, the malicious script executes in their browsers, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability requires a high-privileged user to input the malicious payload and some user interaction (UI) to trigger the script execution. The CVSS 4.0 score is 2.4, indicating a low severity primarily because the attack vector is adjacent network (AV:A), requires high privileges (PR:H), and user interaction (UI:P), with no impact on confidentiality, integrity, or availability. The vulnerability has been addressed in version 2.17.5 of Konsola Proget, and no known exploits are currently reported in the wild. The vulnerability was reserved in February 2025 and published in May 2025 by CERT-PL.
Potential Impact
For European organizations using Proget's Konsola Proget MDM suite, this vulnerability poses a limited but non-negligible risk. Since exploitation requires a high-privileged user to inject malicious scripts, the threat is primarily insider or compromised administrator driven. If exploited, attackers could execute persistent XSS attacks, potentially leading to session hijacking or unauthorized actions within the management console. This could disrupt device management operations or lead to leakage of sensitive configuration data. However, the low CVSS score and requirement for user interaction reduce the likelihood of widespread impact. Organizations with strict access controls and monitoring on administrative accounts will be less affected. Nonetheless, in environments where Proget is used to manage critical devices or software deployments, even limited XSS could be leveraged as a foothold for further attacks or lateral movement. Therefore, European enterprises relying on this product should consider the risk in the context of their internal threat models and administrative practices.
Mitigation Recommendations
1. Immediate upgrade to Konsola Proget version 2.17.5 or later, where the vulnerability is fixed, is the most effective mitigation. 2. Restrict high-privileged user access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Implement Content Security Policy (CSP) headers on the web application to limit the execution of unauthorized scripts and reduce the impact of potential XSS payloads. 4. Conduct regular audits and monitoring of administrative input fields, especially those related to activationMessage or similar parameters, to detect suspicious or anomalous entries. 5. Educate administrators about the risks of injecting untrusted content and enforce input validation policies on the client side as an additional layer. 6. Employ web application firewalls (WAF) with rules tuned to detect and block XSS payloads targeting the Konsola Proget interface. 7. Regularly review and update incident response plans to include scenarios involving insider threats or compromised administrative accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy
CVE-2025-1420: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Proget Proget
Description
Input provided in a field containing "activationMessage" in Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).
AI-Powered Analysis
Technical Analysis
CVE-2025-1420 is a vulnerability classified under CWE-79, which pertains to Improper Neutralization of Input During Web Page Generation, commonly known as Cross-Site Scripting (XSS). This specific vulnerability affects the Konsola Proget component of the Proget MDM suite. The issue arises because input provided in a field named "activationMessage" is not properly sanitized. This improper input validation allows a high-privileged user to inject malicious scripts that are stored persistently within the application. When other users or the same user access the affected page, the malicious script executes in their browsers, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability requires a high-privileged user to input the malicious payload and some user interaction (UI) to trigger the script execution. The CVSS 4.0 score is 2.4, indicating a low severity primarily because the attack vector is adjacent network (AV:A), requires high privileges (PR:H), and user interaction (UI:P), with no impact on confidentiality, integrity, or availability. The vulnerability has been addressed in version 2.17.5 of Konsola Proget, and no known exploits are currently reported in the wild. The vulnerability was reserved in February 2025 and published in May 2025 by CERT-PL.
Potential Impact
For European organizations using Proget's Konsola Proget MDM suite, this vulnerability poses a limited but non-negligible risk. Since exploitation requires a high-privileged user to inject malicious scripts, the threat is primarily insider or compromised administrator driven. If exploited, attackers could execute persistent XSS attacks, potentially leading to session hijacking or unauthorized actions within the management console. This could disrupt device management operations or lead to leakage of sensitive configuration data. However, the low CVSS score and requirement for user interaction reduce the likelihood of widespread impact. Organizations with strict access controls and monitoring on administrative accounts will be less affected. Nonetheless, in environments where Proget is used to manage critical devices or software deployments, even limited XSS could be leveraged as a foothold for further attacks or lateral movement. Therefore, European enterprises relying on this product should consider the risk in the context of their internal threat models and administrative practices.
Mitigation Recommendations
1. Immediate upgrade to Konsola Proget version 2.17.5 or later, where the vulnerability is fixed, is the most effective mitigation. 2. Restrict high-privileged user access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Implement Content Security Policy (CSP) headers on the web application to limit the execution of unauthorized scripts and reduce the impact of potential XSS payloads. 4. Conduct regular audits and monitoring of administrative input fields, especially those related to activationMessage or similar parameters, to detect suspicious or anomalous entries. 5. Educate administrators about the risks of injecting untrusted content and enforce input validation policies on the client side as an additional layer. 6. Employ web application firewalls (WAF) with rules tuned to detect and block XSS payloads targeting the Konsola Proget interface. 7. Regularly review and update incident response plans to include scenarios involving insider threats or compromised administrative accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-02-18T13:43:49.957Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682dd047c4522896dcbfd71e
Added to database: 5/21/2025, 1:08:23 PM
Last enriched: 7/6/2025, 5:26:22 AM
Last updated: 8/15/2025, 8:02:15 AM
Views: 14
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.