CVE-2025-22791: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in twh offset writing
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in twh offset writing allows Reflected XSS.This issue affects offset writing: from n/a through 1.2.
AI Analysis
Technical Summary
CVE-2025-22791 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the 'offset writing' component of the 'twh' product, affecting versions up to 1.2. This vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the flaw allows malicious actors to inject and execute arbitrary scripts in the context of a victim's browser when they visit a crafted URL or interact with manipulated web content. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction (such as clicking a malicious link). The CVSS 3.1 base score of 7.1 reflects the significant risk posed by this vulnerability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality, integrity, and availability rated as low (C:L, I:L, A:L). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the system or application. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a web-facing component makes it a likely target for exploitation once public details are widely disseminated. The lack of available patches at the time of publication necessitates immediate attention to mitigation strategies to reduce exposure.
Potential Impact
For European organizations, the impact of CVE-2025-22791 can be significant, particularly for those relying on the 'twh offset writing' product in their web infrastructure. Successful exploitation can lead to session hijacking, theft of sensitive information such as cookies or tokens, defacement of web content, or redirection to malicious sites, undermining user trust and potentially causing reputational damage. The reflected XSS nature means attacks typically require social engineering to lure users into clicking malicious links, which can be effective in targeted phishing campaigns. Given the scope change, the vulnerability might allow attackers to affect multiple components or user sessions beyond the initial injection point, increasing the potential damage. European organizations subject to stringent data protection regulations such as GDPR could face compliance risks and financial penalties if user data confidentiality or integrity is compromised. Additionally, sectors with high web interaction such as finance, e-commerce, healthcare, and government services are particularly vulnerable to operational disruptions and loss of customer confidence.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the vulnerable parameters or endpoints associated with 'offset writing'. Input validation and output encoding should be enforced at the application level to neutralize potentially harmful input before rendering. Organizations should conduct thorough code reviews and security testing focusing on user input handling in the affected component. User awareness training to recognize phishing attempts can reduce the risk of successful exploitation via social engineering. Monitoring web server logs and network traffic for unusual patterns or repeated attempts to exploit reflected XSS can help in early detection. Once patches become available, prompt testing and deployment are critical. Additionally, employing Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting the execution of unauthorized scripts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-22791: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in twh offset writing
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in twh offset writing allows Reflected XSS.This issue affects offset writing: from n/a through 1.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-22791 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the 'offset writing' component of the 'twh' product, affecting versions up to 1.2. This vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the flaw allows malicious actors to inject and execute arbitrary scripts in the context of a victim's browser when they visit a crafted URL or interact with manipulated web content. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction (such as clicking a malicious link). The CVSS 3.1 base score of 7.1 reflects the significant risk posed by this vulnerability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality, integrity, and availability rated as low (C:L, I:L, A:L). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the system or application. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a web-facing component makes it a likely target for exploitation once public details are widely disseminated. The lack of available patches at the time of publication necessitates immediate attention to mitigation strategies to reduce exposure.
Potential Impact
For European organizations, the impact of CVE-2025-22791 can be significant, particularly for those relying on the 'twh offset writing' product in their web infrastructure. Successful exploitation can lead to session hijacking, theft of sensitive information such as cookies or tokens, defacement of web content, or redirection to malicious sites, undermining user trust and potentially causing reputational damage. The reflected XSS nature means attacks typically require social engineering to lure users into clicking malicious links, which can be effective in targeted phishing campaigns. Given the scope change, the vulnerability might allow attackers to affect multiple components or user sessions beyond the initial injection point, increasing the potential damage. European organizations subject to stringent data protection regulations such as GDPR could face compliance risks and financial penalties if user data confidentiality or integrity is compromised. Additionally, sectors with high web interaction such as finance, e-commerce, healthcare, and government services are particularly vulnerable to operational disruptions and loss of customer confidence.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the vulnerable parameters or endpoints associated with 'offset writing'. Input validation and output encoding should be enforced at the application level to neutralize potentially harmful input before rendering. Organizations should conduct thorough code reviews and security testing focusing on user input handling in the affected component. User awareness training to recognize phishing attempts can reduce the risk of successful exploitation via social engineering. Monitoring web server logs and network traffic for unusual patterns or repeated attempts to exploit reflected XSS can help in early detection. Once patches become available, prompt testing and deployment are critical. Additionally, employing Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting the execution of unauthorized scripts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-01-07T21:05:18.434Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb545
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 5:04:05 PM
Last updated: 7/31/2025, 12:09:54 PM
Views: 17
Related Threats
CVE-2025-4576: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-8731: Use of Default Credentials in TRENDnet TI-G160i
CriticalCVE-2025-8356: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Xerox FreeFlow Core
CriticalCVE-2025-8355: CWE-611 Improper Restriction of XML External Entity Reference in Xerox FreeFlow Core
HighCVE-2025-36023: CWE-639 Authorization Bypass Through User-Controlled Key in IBM Cloud Pak for Business Automation
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.