Skip to main content

CVE-2025-22790: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in asmedia moseter

High
VulnerabilityCVE-2025-22790cvecve-2025-22790cwe-79
Published: Mon May 19 2025 (05/19/2025, 16:00:07 UTC)
Source: CVE
Vendor/Project: asmedia
Product: moseter

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in asmedia allows Reflected XSS.This issue affects moseter: from n/a through 1.3.1.

AI-Powered Analysis

AILast updated: 07/11/2025, 16:48:49 UTC

Technical Analysis

CVE-2025-22790 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the asmedia product 'moseter' up to version 1.3.1. This vulnerability arises due to improper neutralization of user input during web page generation, classified under CWE-79. Specifically, the application fails to adequately sanitize or encode input parameters that are reflected back in the web response, allowing an attacker to inject malicious scripts. When a victim interacts with a crafted URL or input, the malicious script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 3.1 base score of 7.1 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects components beyond the vulnerable component itself, and it impacts confidentiality, integrity, and availability to a low degree (C:L/I:L/A:L). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 19, 2025, with the initial reservation in January 2025. The affected product, moseter, is presumably a web-facing interface or management console related to asmedia hardware or software solutions, which may be embedded in devices or used in enterprise environments.

Potential Impact

For European organizations, the impact of this reflected XSS vulnerability depends largely on the deployment and usage of the asmedia moseter product. If moseter is integrated into network devices, storage controllers, or management interfaces used within European enterprises, this vulnerability could be exploited by attackers to execute malicious scripts in the browsers of administrative or end users. This could lead to theft of session tokens, unauthorized command execution, or pivoting within internal networks. Given the reflected nature of the XSS, phishing or social engineering campaigns could be used to lure users into clicking malicious links. The compromise of administrative interfaces could have cascading effects on confidentiality and integrity of sensitive data, as well as availability if attackers disrupt device management. Additionally, the scope change in the CVSS vector suggests that the impact could extend beyond the immediate vulnerable component, potentially affecting other integrated systems. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities rapidly once public disclosure occurs. European organizations with critical infrastructure or high-value data managed via asmedia products should be particularly vigilant.

Mitigation Recommendations

Given the absence of an official patch at the time of this report, European organizations should implement several practical mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block reflected XSS attack patterns targeting moseter interfaces. 2) Restrict access to moseter management interfaces to trusted internal networks or VPNs, minimizing exposure to external attackers. 3) Implement strict Content Security Policy (CSP) headers on web interfaces to limit the execution of unauthorized scripts. 4) Educate users and administrators about phishing risks and the dangers of clicking untrusted links that could exploit reflected XSS. 5) Monitor logs and network traffic for unusual activity or repeated attempts to access vulnerable endpoints with suspicious parameters. 6) Engage with asmedia or vendors for timely patch releases and apply updates promptly once available. 7) Consider isolating or segmenting devices running moseter to reduce potential lateral movement in case of compromise. These targeted mitigations go beyond generic advice by focusing on network-level controls, user awareness, and proactive monitoring tailored to the nature of this reflected XSS vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-01-07T21:05:18.434Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb4ec

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 4:48:49 PM

Last updated: 8/7/2025, 10:28:32 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats