Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23757: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Proloy Chakroborty ZD Scribd iPaper

0
High
VulnerabilityCVE-2025-23757cvecve-2025-23757cwe-79
Published: Wed Dec 31 2025 (12/31/2025, 19:58:33 UTC)
Source: CVE Database V5
Vendor/Project: Proloy Chakroborty
Product: ZD Scribd iPaper

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Proloy Chakroborty ZD Scribd iPaper allows Reflected XSS.This issue affects ZD Scribd iPaper: from n/a through 1.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:43:14 UTC

Technical Analysis

CVE-2025-23757 is a reflected Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the ZD Scribd iPaper product developed by Proloy Chakroborty. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows attackers to inject malicious JavaScript code that executes in the context of the victim's browser. This reflected XSS does not require authentication (PR:N) but does require user interaction (UI:R), such as clicking on a maliciously crafted URL. The vulnerability has a CVSS v3.1 base score of 7.1, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. Although no known exploits are currently reported in the wild and no patches have been released, the vulnerability poses significant risk due to the potential for session hijacking, credential theft, and unauthorized actions performed on behalf of the user. The affected versions are unspecified but include all versions up to 1.0. The vulnerability highlights the need for proper input validation and output encoding in web applications to prevent injection of executable code. Since ZD Scribd iPaper is a web-based document viewer or embedding tool, exploitation could target users accessing documents through this platform, potentially compromising sensitive information or enabling further attacks within the victim's session.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive information, session hijacking, and potential defacement or disruption of services relying on ZD Scribd iPaper. Organizations using this product for document sharing or embedding may expose their users to malicious scripts that steal credentials or perform unauthorized actions. The impact is particularly critical for sectors handling confidential data such as finance, healthcare, and government. Additionally, the reflected XSS could be leveraged as an initial vector for more complex attacks like phishing or malware distribution. The lack of patches increases the window of exposure, and the requirement for user interaction means targeted social engineering campaigns could amplify the threat. The vulnerability could also undermine trust in digital document workflows and compliance with data protection regulations such as GDPR if personal data is compromised.

Mitigation Recommendations

European organizations should immediately review their use of ZD Scribd iPaper and restrict access where possible until a patch is available. Implement web application firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting this product. Conduct thorough input validation and output encoding on all user-supplied data within the application environment. Educate users to avoid clicking on suspicious links, especially those purporting to lead to documents hosted via ZD Scribd iPaper. Monitor web traffic and logs for unusual patterns indicative of exploitation attempts. If feasible, isolate or sandbox the use of ZD Scribd iPaper to limit potential damage. Engage with the vendor or developer to obtain patches or updates and apply them promptly once released. Consider alternative secure document sharing solutions if the risk is deemed unacceptable. Finally, integrate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-16T11:29:46.483Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69558403db813ff03efee336

Added to database: 12/31/2025, 8:13:55 PM

Last enriched: 1/20/2026, 7:43:14 PM

Last updated: 2/5/2026, 1:16:05 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats