Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2204: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Tapandsign Technologies Software Inc. Tap&Sign

0
Medium
VulnerabilityCVE-2025-2204cvecve-2025-2204cwe-79
Published: Fri Jan 23 2026 (01/23/2026, 11:55:25 UTC)
Source: CVE Database V5
Vendor/Project: Tapandsign Technologies Software Inc.
Product: Tap&Sign

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tapandsign Technologies Software Inc. Tap&Sign allows Cross-Site Scripting (XSS).This issue affects Tap&Sign: through 23012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/23/2026, 12:20:25 UTC

Technical Analysis

CVE-2025-2204 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting the Tap&Sign product by Tapandsign Technologies Software Inc. The vulnerability stems from improper neutralization of input during web page generation, which allows attackers to inject malicious scripts into web pages served by the application. This can lead to unauthorized script execution in the context of the victim's browser, potentially enabling theft of session tokens, defacement, or redirection to malicious sites. The vulnerability affects all versions up to 23012026, with no patches currently available and no vendor response to disclosure. The CVSS 3.1 base score is 4.7 (medium), with vector AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L, indicating network attack vector, low attack complexity, but requiring high privileges and no user interaction. The scope is unchanged, and the impact affects confidentiality, integrity, and availability at a low level. No known exploits are reported in the wild. The vulnerability is significant for environments where Tap&Sign is used for digital signing or document workflows, as malicious script injection could undermine trust and security of signed documents or user sessions.

Potential Impact

For European organizations, the impact of CVE-2025-2204 depends largely on the deployment scale of Tap&Sign within their infrastructure. The XSS vulnerability could allow attackers with network access and elevated privileges to execute arbitrary scripts, potentially leading to session hijacking, unauthorized actions on behalf of users, or information disclosure. This could disrupt business processes relying on digital signatures and document workflows, affecting confidentiality and integrity of sensitive data. Although the attack complexity is low, the requirement for high privileges limits exploitation to insiders or attackers who have already gained elevated access, reducing the overall risk. However, in regulated sectors such as finance, legal, or government, even limited compromise of document signing processes could have serious compliance and reputational consequences. The lack of vendor response and patches increases exposure duration, necessitating proactive mitigation by affected organizations.

Mitigation Recommendations

European organizations using Tap&Sign should implement strict input validation and output encoding on all user-supplied data to prevent script injection. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. Limit network access to Tap&Sign interfaces to trusted users and networks, enforcing strong authentication and role-based access controls to minimize privilege escalation risks. Monitor application logs for unusual activities indicative of exploitation attempts. Consider deploying web application firewalls (WAF) with rules targeting XSS patterns specific to Tap&Sign. Since no official patches are available, organizations should engage with Tapandsign Technologies for updates or consider alternative solutions if risk is unacceptable. Regular security training for administrators and users on recognizing phishing or social engineering attempts that could lead to privilege escalation is also recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-03-11T13:30:59.424Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697364324623b1157c3bbd99

Added to database: 1/23/2026, 12:06:10 PM

Last enriched: 1/23/2026, 12:20:25 PM

Last updated: 1/23/2026, 2:46:17 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats