CVE-2025-21572: OpenGrok 1.13.25 has a reflected Cross-Site Scripting (XSS) issue when producing the history view page. This happens through improper handling of path segments. The application reflects unsanitized user input into the HTML output. in Oracle Corporation OpenGrok
OpenGrok 1.13.25 has a reflected Cross-Site Scripting (XSS) issue when producing the history view page. This happens through improper handling of path segments. The application reflects unsanitized user input into the HTML output.
AI Analysis
Technical Summary
CVE-2025-21572 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Oracle Corporation's OpenGrok version 1.13.25. OpenGrok is a source code search and cross-reference engine widely used by development teams to navigate and analyze large codebases. The vulnerability arises specifically in the 'history view' page, where the application improperly handles path segments. Unsanitized user input from these path segments is directly reflected into the HTML output without adequate encoding or validation. This flaw allows an attacker to craft malicious URLs that, when visited by a user, execute arbitrary JavaScript code within the victim's browser context. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be launched remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (clicking a crafted link). The scope is changed, meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not affect availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability could be leveraged in phishing campaigns or targeted attacks to steal session tokens, perform actions on behalf of users, or conduct further attacks within the context of the affected web application.
Potential Impact
For European organizations using OpenGrok 1.13.25, this vulnerability poses a risk primarily to developers and internal users who access the history view page. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed under the victim's identity, potentially exposing sensitive source code or internal project information. This can undermine the confidentiality and integrity of intellectual property and development workflows. Since OpenGrok is often deployed in enterprise environments for code search and analysis, exploitation could facilitate lateral movement or further compromise if attackers gain access to internal networks. The requirement for user interaction limits mass exploitation but does not eliminate targeted spear-phishing risks. European organizations with strict data protection regulations (e.g., GDPR) must consider the implications of unauthorized data exposure or breach resulting from such attacks. Additionally, the reflected XSS could be used to bypass security controls or deliver secondary payloads, increasing the threat surface.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are running OpenGrok version 1.13.25 and prioritize upgrading to a patched version once available from Oracle. In the absence of an official patch, immediate mitigations include implementing web application firewall (WAF) rules to detect and block suspicious input patterns targeting the history view page, especially those containing script tags or suspicious characters in path segments. Input validation and output encoding should be enforced at the application level to sanitize user-supplied path segments before rendering. Organizations can also restrict access to the OpenGrok interface to trusted internal networks or VPN users to reduce exposure. Educating users about the risks of clicking unsolicited links and employing browser security features such as Content Security Policy (CSP) can help mitigate the impact of reflected XSS attacks. Regular security assessments and penetration testing should be conducted to identify and remediate similar injection flaws proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2025-21572: OpenGrok 1.13.25 has a reflected Cross-Site Scripting (XSS) issue when producing the history view page. This happens through improper handling of path segments. The application reflects unsanitized user input into the HTML output. in Oracle Corporation OpenGrok
Description
OpenGrok 1.13.25 has a reflected Cross-Site Scripting (XSS) issue when producing the history view page. This happens through improper handling of path segments. The application reflects unsanitized user input into the HTML output.
AI-Powered Analysis
Technical Analysis
CVE-2025-21572 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Oracle Corporation's OpenGrok version 1.13.25. OpenGrok is a source code search and cross-reference engine widely used by development teams to navigate and analyze large codebases. The vulnerability arises specifically in the 'history view' page, where the application improperly handles path segments. Unsanitized user input from these path segments is directly reflected into the HTML output without adequate encoding or validation. This flaw allows an attacker to craft malicious URLs that, when visited by a user, execute arbitrary JavaScript code within the victim's browser context. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be launched remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (clicking a crafted link). The scope is changed, meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not affect availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability could be leveraged in phishing campaigns or targeted attacks to steal session tokens, perform actions on behalf of users, or conduct further attacks within the context of the affected web application.
Potential Impact
For European organizations using OpenGrok 1.13.25, this vulnerability poses a risk primarily to developers and internal users who access the history view page. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed under the victim's identity, potentially exposing sensitive source code or internal project information. This can undermine the confidentiality and integrity of intellectual property and development workflows. Since OpenGrok is often deployed in enterprise environments for code search and analysis, exploitation could facilitate lateral movement or further compromise if attackers gain access to internal networks. The requirement for user interaction limits mass exploitation but does not eliminate targeted spear-phishing risks. European organizations with strict data protection regulations (e.g., GDPR) must consider the implications of unauthorized data exposure or breach resulting from such attacks. Additionally, the reflected XSS could be used to bypass security controls or deliver secondary payloads, increasing the threat surface.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are running OpenGrok version 1.13.25 and prioritize upgrading to a patched version once available from Oracle. In the absence of an official patch, immediate mitigations include implementing web application firewall (WAF) rules to detect and block suspicious input patterns targeting the history view page, especially those containing script tags or suspicious characters in path segments. Input validation and output encoding should be enforced at the application level to sanitize user-supplied path segments before rendering. Organizations can also restrict access to the OpenGrok interface to trusted internal networks or VPN users to reduce exposure. Educating users about the risks of clicking unsolicited links and employing browser security features such as Content Security Policy (CSP) can help mitigate the impact of reflected XSS attacks. Regular security assessments and penetration testing should be conducted to identify and remediate similar injection flaws proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2024-12-24T23:18:54.784Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbda5df
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 7/5/2025, 6:25:44 PM
Last updated: 8/12/2025, 4:54:18 PM
Views: 14
Related Threats
CVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-8098: CWE-276: Incorrect Default Permissions in Lenovo PC Manager
HighCVE-2025-53192: CWE-146 Improper Neutralization of Expression/Command Delimiters in Apache Software Foundation Apache Commons OGNL
HighCVE-2025-4371: CWE-347: Improper Verification of Cryptographic Signature in Lenovo 510 FHD Webcam
HighCVE-2025-32992: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.