Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15479: NGSurvey Enterprise 3.6.4 stored XSS via survey content enables arbitrary JavaScript execution in Data Illusion Zumbrunn NGSurvey

0
Medium
VulnerabilityCVE-2025-15479cvecve-2025-15479
Published: Wed Jan 07 2026 (01/07/2026, 13:23:09 UTC)
Source: CVE Database V5
Vendor/Project: Data Illusion Zumbrunn
Product: NGSurvey

Description

CVE-2025-15479 is a stored cross-site scripting (XSS) vulnerability in NGSurvey Enterprise Edition 3. 6. 4 by Data Illusion Zumbrunn. It affects both Windows and Linux server deployments. Authenticated users with survey creation or editing privileges can inject malicious JavaScript into survey content, which is then executed in the browsers of other users viewing the survey. This can lead to session hijacking and unauthorized actions performed on behalf of victims. The vulnerability arises from improper output encoding of survey content. The CVSS 4. 0 score is 5. 1, indicating medium severity.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:56:40 UTC

Technical Analysis

CVE-2025-15479 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, affecting NGSurvey Enterprise Edition version 3.6.4, a survey management platform by Data Illusion Zumbrunn. The vulnerability exists in the survey content and administration modules on both Windows and Linux server platforms. Authenticated users with privileges to create or edit surveys can inject arbitrary JavaScript code into survey content fields. This malicious script is stored persistently and executed in the browsers of other users who view the infected survey content. The root cause is the lack of proper output encoding or sanitization of user-supplied survey content before rendering it in the web interface. Exploitation does not require elevated privileges beyond survey editing rights, but does require authentication and some user interaction (viewing the malicious survey). The impact includes theft of session cookies, enabling session hijacking, and the ability to perform unauthorized actions on behalf of other users. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N) reflects network attack vector, low attack complexity, no additional privileges beyond survey editing, and user interaction required. The vulnerability has a medium severity score of 5.1. No public exploit code or active exploitation has been reported yet. The vulnerability affects all supported platforms of NGSurvey 3.6.4, making it broadly relevant to deployments of this version. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for mitigation.

Potential Impact

For European organizations using NGSurvey Enterprise 3.6.4, this vulnerability poses a risk of session hijacking and unauthorized actions within the survey platform, potentially leading to data leakage or manipulation of survey results. Since NGSurvey is often used for collecting sensitive feedback and data, exploitation could compromise confidentiality and integrity of survey data. The stored XSS could also be leveraged to pivot to other internal systems if the platform is integrated with broader enterprise environments. Organizations with multiple users having survey editing privileges are at higher risk, as attackers require authenticated access with these rights. The impact on availability is limited, but the breach of trust and data integrity could have regulatory and reputational consequences, especially under GDPR. Attackers could exploit this vulnerability to impersonate users, escalate privileges indirectly, or conduct phishing attacks within the organization. The medium severity indicates a moderate but actionable threat that should not be ignored.

Mitigation Recommendations

1. Immediately restrict survey creation and editing privileges to the minimum number of trusted users to reduce the attack surface. 2. Implement strict input validation and output encoding on all user-supplied survey content fields to neutralize malicious scripts. 3. Monitor and audit survey content for suspicious or unexpected JavaScript code injections. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the survey platform. 5. Use web application firewalls (WAFs) with rules targeting XSS payloads to detect and block exploitation attempts. 6. If a patch becomes available from Data Illusion Zumbrunn, prioritize its deployment across all affected systems. 7. Educate users to be cautious when interacting with survey content, especially if unexpected behavior is observed. 8. Regularly review user roles and permissions to ensure least privilege principles are enforced. 9. Consider isolating the NGSurvey platform in a segmented network zone to limit lateral movement if compromised. 10. Enable multi-factor authentication (MFA) for all users to reduce the risk of credential compromise facilitating exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TCS-CERT
Date Reserved
2026-01-07T13:10:13.147Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695e62d67349d0379da25d18

Added to database: 1/7/2026, 1:42:46 PM

Last enriched: 1/14/2026, 3:56:40 PM

Last updated: 2/6/2026, 9:08:55 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats