Skip to main content

CVE-2025-21572: OpenGrok 1.13.25 has a reflected Cross-Site Scripting (XSS) issue when producing the history view page. This happens through improper handling of path segments. The application reflects unsanitized user input into the HTML output. in Oracle Corporation OpenGrok

Medium
VulnerabilityCVE-2025-21572cvecve-2025-21572
Published: Fri May 02 2025 (05/02/2025, 21:46:31 UTC)
Source: CVE
Vendor/Project: Oracle Corporation
Product: OpenGrok

Description

OpenGrok 1.13.25 has a reflected Cross-Site Scripting (XSS) issue when producing the history view page. This happens through improper handling of path segments. The application reflects unsanitized user input into the HTML output.

AI-Powered Analysis

AILast updated: 07/05/2025, 18:25:44 UTC

Technical Analysis

CVE-2025-21572 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Oracle Corporation's OpenGrok version 1.13.25. OpenGrok is a source code search and cross-reference engine widely used by development teams to navigate and analyze large codebases. The vulnerability arises specifically in the 'history view' page, where the application improperly handles path segments. Unsanitized user input from these path segments is directly reflected into the HTML output without adequate encoding or validation. This flaw allows an attacker to craft malicious URLs that, when visited by a user, execute arbitrary JavaScript code within the victim's browser context. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be launched remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (clicking a crafted link). The scope is changed, meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not affect availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability could be leveraged in phishing campaigns or targeted attacks to steal session tokens, perform actions on behalf of users, or conduct further attacks within the context of the affected web application.

Potential Impact

For European organizations using OpenGrok 1.13.25, this vulnerability poses a risk primarily to developers and internal users who access the history view page. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed under the victim's identity, potentially exposing sensitive source code or internal project information. This can undermine the confidentiality and integrity of intellectual property and development workflows. Since OpenGrok is often deployed in enterprise environments for code search and analysis, exploitation could facilitate lateral movement or further compromise if attackers gain access to internal networks. The requirement for user interaction limits mass exploitation but does not eliminate targeted spear-phishing risks. European organizations with strict data protection regulations (e.g., GDPR) must consider the implications of unauthorized data exposure or breach resulting from such attacks. Additionally, the reflected XSS could be used to bypass security controls or deliver secondary payloads, increasing the threat surface.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are running OpenGrok version 1.13.25 and prioritize upgrading to a patched version once available from Oracle. In the absence of an official patch, immediate mitigations include implementing web application firewall (WAF) rules to detect and block suspicious input patterns targeting the history view page, especially those containing script tags or suspicious characters in path segments. Input validation and output encoding should be enforced at the application level to sanitize user-supplied path segments before rendering. Organizations can also restrict access to the OpenGrok interface to trusted internal networks or VPN users to reduce exposure. Educating users about the risks of clicking unsolicited links and employing browser security features such as Content Security Policy (CSP) can help mitigate the impact of reflected XSS attacks. Regular security assessments and penetration testing should be conducted to identify and remediate similar injection flaws proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2024-12-24T23:18:54.784Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda5df

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 6:25:44 PM

Last updated: 8/12/2025, 4:54:18 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats