CVE-2025-23814: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NotFound CRUDLab Like Box
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CRUDLab Like Box allows Reflected XSS. This issue affects CRUDLab Like Box: from n/a through 2.0.9.
AI Analysis
Technical Summary
CVE-2025-23814 is a high-severity reflected Cross-site Scripting (XSS) vulnerability affecting the NotFound CRUDLab Like Box product, versions up to 2.0.9. The vulnerability stems from improper neutralization of input during web page generation, classified under CWE-79. Specifically, user-supplied input is not adequately sanitized or encoded before being included in dynamically generated web pages, allowing attackers to inject malicious scripts that execute in the context of the victim's browser. The vulnerability is exploitable remotely over the network without requiring authentication (AV:N/AC:L/PR:N), but does require user interaction (UI:R), such as clicking a crafted link or visiting a malicious URL. The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component, potentially impacting other parts of the application or user sessions. The impact includes limited confidentiality, integrity, and availability losses (C:L/I:L/A:L), as attackers can steal session tokens, manipulate client-side data, or perform actions on behalf of users. No known public exploits are reported yet, but the vulnerability is publicly disclosed and assigned a CVSS 3.1 score of 7.1, reflecting a high risk. The lack of available patches at the time of disclosure increases the urgency for mitigation. The vulnerability affects CRUDLab Like Box, a web application component used for CRUD operations, which may be integrated into various web platforms. The reflected XSS nature means the attack vector is typically through crafted URLs or input fields that reflect malicious payloads back to users without proper encoding or filtering.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those using CRUDLab Like Box in their web applications or services. Exploitation could lead to session hijacking, credential theft, or unauthorized actions performed in the context of authenticated users, potentially compromising sensitive business data or user privacy. This is particularly critical for sectors handling personal data under GDPR, such as finance, healthcare, and e-commerce, where data breaches can result in regulatory penalties and reputational damage. Additionally, reflected XSS can be leveraged as a stepping stone for more complex attacks like phishing or malware distribution. The vulnerability's ability to affect multiple users through crafted links increases the risk of widespread impact. Given the cross-site nature, attacks could also facilitate lateral movement within web applications, undermining trust in affected services. The absence of patches means organizations must rely on immediate mitigations to protect their users and infrastructure.
Mitigation Recommendations
1. Immediate deployment of Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting CRUDLab Like Box endpoints. 2. Implement strict Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of successful XSS attempts. 3. Conduct thorough input validation and output encoding on all user-supplied data, especially in URL parameters and form inputs reflected in web pages, until official patches are available. 4. Educate users and administrators about the risk of clicking suspicious links and encourage the use of browser security features that can mitigate XSS risks. 5. Monitor web application logs for unusual patterns indicative of attempted XSS exploitation, such as suspicious query strings or repeated access to vulnerable endpoints. 6. Plan and prioritize patching as soon as vendor updates become available, and consider temporary removal or disabling of CRUDLab Like Box components if feasible. 7. Use automated scanning tools to identify instances of CRUDLab Like Box in the environment and assess exposure levels.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-23814: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NotFound CRUDLab Like Box
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CRUDLab Like Box allows Reflected XSS. This issue affects CRUDLab Like Box: from n/a through 2.0.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-23814 is a high-severity reflected Cross-site Scripting (XSS) vulnerability affecting the NotFound CRUDLab Like Box product, versions up to 2.0.9. The vulnerability stems from improper neutralization of input during web page generation, classified under CWE-79. Specifically, user-supplied input is not adequately sanitized or encoded before being included in dynamically generated web pages, allowing attackers to inject malicious scripts that execute in the context of the victim's browser. The vulnerability is exploitable remotely over the network without requiring authentication (AV:N/AC:L/PR:N), but does require user interaction (UI:R), such as clicking a crafted link or visiting a malicious URL. The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component, potentially impacting other parts of the application or user sessions. The impact includes limited confidentiality, integrity, and availability losses (C:L/I:L/A:L), as attackers can steal session tokens, manipulate client-side data, or perform actions on behalf of users. No known public exploits are reported yet, but the vulnerability is publicly disclosed and assigned a CVSS 3.1 score of 7.1, reflecting a high risk. The lack of available patches at the time of disclosure increases the urgency for mitigation. The vulnerability affects CRUDLab Like Box, a web application component used for CRUD operations, which may be integrated into various web platforms. The reflected XSS nature means the attack vector is typically through crafted URLs or input fields that reflect malicious payloads back to users without proper encoding or filtering.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those using CRUDLab Like Box in their web applications or services. Exploitation could lead to session hijacking, credential theft, or unauthorized actions performed in the context of authenticated users, potentially compromising sensitive business data or user privacy. This is particularly critical for sectors handling personal data under GDPR, such as finance, healthcare, and e-commerce, where data breaches can result in regulatory penalties and reputational damage. Additionally, reflected XSS can be leveraged as a stepping stone for more complex attacks like phishing or malware distribution. The vulnerability's ability to affect multiple users through crafted links increases the risk of widespread impact. Given the cross-site nature, attacks could also facilitate lateral movement within web applications, undermining trust in affected services. The absence of patches means organizations must rely on immediate mitigations to protect their users and infrastructure.
Mitigation Recommendations
1. Immediate deployment of Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting CRUDLab Like Box endpoints. 2. Implement strict Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of successful XSS attempts. 3. Conduct thorough input validation and output encoding on all user-supplied data, especially in URL parameters and form inputs reflected in web pages, until official patches are available. 4. Educate users and administrators about the risk of clicking suspicious links and encourage the use of browser security features that can mitigate XSS risks. 5. Monitor web application logs for unusual patterns indicative of attempted XSS exploitation, such as suspicious query strings or repeated access to vulnerable endpoints. 6. Plan and prioritize patching as soon as vendor updates become available, and consider temporary removal or disabling of CRUDLab Like Box components if feasible. 7. Use automated scanning tools to identify instances of CRUDLab Like Box in the environment and assess exposure levels.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-01-16T11:30:44.311Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6d70
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 4:16:21 AM
Last updated: 8/6/2025, 12:06:08 AM
Views: 12
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.