CVE-2025-23850: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NotFound Mojo Under Construction
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mojo Under Construction allows Reflected XSS. This issue affects Mojo Under Construction: from n/a through 1.1.2.
AI Analysis
Technical Summary
CVE-2025-23850 is a high-severity reflected Cross-Site Scripting (XSS) vulnerability identified in the NotFound Mojo Under Construction plugin, affecting versions up to 1.1.2. The vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the plugin fails to adequately sanitize or encode input parameters that are reflected in the HTTP response, allowing an attacker to inject malicious scripts. When a victim visits a crafted URL containing the malicious payload, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, defacement, or redirection to malicious sites. The CVSS v3.1 base score is 7.1, indicating a high severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) shows that the attack can be launched remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (clicking a crafted link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, and it impacts confidentiality, integrity, and availability to a limited extent. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in January 2025 and published in March 2025. This reflected XSS vulnerability is typical in web applications that dynamically generate pages based on user input without proper encoding or sanitization, and it is critical to address it promptly to prevent exploitation.
Potential Impact
For European organizations using the NotFound Mojo Under Construction plugin, this vulnerability poses a significant risk. Exploitation could allow attackers to execute arbitrary JavaScript in the context of the affected website, potentially leading to theft of user credentials, session tokens, or other sensitive information. This can result in unauthorized access to user accounts or administrative interfaces. Additionally, attackers could perform phishing attacks by injecting malicious content or redirect users to fraudulent sites, damaging organizational reputation and user trust. The reflected XSS can also be used as a pivot point for further attacks, such as delivering malware or exploiting other vulnerabilities. Given the plugin's role in displaying 'under construction' pages, it may be used on websites undergoing development or maintenance, which might have less stringent security controls, increasing risk. The impact extends to confidentiality, integrity, and availability of web services, potentially disrupting business operations and compliance with data protection regulations such as GDPR. Organizations in sectors with high web presence or customer interaction, including e-commerce, finance, and public services, are particularly vulnerable to reputational damage and regulatory penalties if exploited.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their use of the NotFound Mojo Under Construction plugin and identify all instances and versions deployed. Until an official patch is released, organizations should consider disabling or removing the plugin from production environments. If removal is not feasible, implement web application firewall (WAF) rules to detect and block typical reflected XSS attack patterns targeting the plugin's endpoints. Input validation and output encoding should be enforced at the application level, ensuring all user-supplied data is properly sanitized before rendering in HTML contexts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly monitor web server logs for suspicious requests that may indicate attempted exploitation. Additionally, educate users and administrators about the risks of clicking unknown links to reduce the likelihood of successful user interaction-based attacks. Once a patch is available from the vendor, prioritize its deployment after testing in staging environments. Finally, conduct penetration testing and vulnerability scanning focused on XSS to verify the effectiveness of mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-23850: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NotFound Mojo Under Construction
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mojo Under Construction allows Reflected XSS. This issue affects Mojo Under Construction: from n/a through 1.1.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-23850 is a high-severity reflected Cross-Site Scripting (XSS) vulnerability identified in the NotFound Mojo Under Construction plugin, affecting versions up to 1.1.2. The vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the plugin fails to adequately sanitize or encode input parameters that are reflected in the HTTP response, allowing an attacker to inject malicious scripts. When a victim visits a crafted URL containing the malicious payload, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, defacement, or redirection to malicious sites. The CVSS v3.1 base score is 7.1, indicating a high severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) shows that the attack can be launched remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (clicking a crafted link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, and it impacts confidentiality, integrity, and availability to a limited extent. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in January 2025 and published in March 2025. This reflected XSS vulnerability is typical in web applications that dynamically generate pages based on user input without proper encoding or sanitization, and it is critical to address it promptly to prevent exploitation.
Potential Impact
For European organizations using the NotFound Mojo Under Construction plugin, this vulnerability poses a significant risk. Exploitation could allow attackers to execute arbitrary JavaScript in the context of the affected website, potentially leading to theft of user credentials, session tokens, or other sensitive information. This can result in unauthorized access to user accounts or administrative interfaces. Additionally, attackers could perform phishing attacks by injecting malicious content or redirect users to fraudulent sites, damaging organizational reputation and user trust. The reflected XSS can also be used as a pivot point for further attacks, such as delivering malware or exploiting other vulnerabilities. Given the plugin's role in displaying 'under construction' pages, it may be used on websites undergoing development or maintenance, which might have less stringent security controls, increasing risk. The impact extends to confidentiality, integrity, and availability of web services, potentially disrupting business operations and compliance with data protection regulations such as GDPR. Organizations in sectors with high web presence or customer interaction, including e-commerce, finance, and public services, are particularly vulnerable to reputational damage and regulatory penalties if exploited.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their use of the NotFound Mojo Under Construction plugin and identify all instances and versions deployed. Until an official patch is released, organizations should consider disabling or removing the plugin from production environments. If removal is not feasible, implement web application firewall (WAF) rules to detect and block typical reflected XSS attack patterns targeting the plugin's endpoints. Input validation and output encoding should be enforced at the application level, ensuring all user-supplied data is properly sanitized before rendering in HTML contexts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly monitor web server logs for suspicious requests that may indicate attempted exploitation. Additionally, educate users and administrators about the risks of clicking unknown links to reduce the likelihood of successful user interaction-based attacks. Once a patch is available from the vendor, prioritize its deployment after testing in staging environments. Finally, conduct penetration testing and vulnerability scanning focused on XSS to verify the effectiveness of mitigations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-01-16T11:31:05.973Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6d7c
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 4:16:43 AM
Last updated: 7/30/2025, 5:46:51 PM
Views: 14
Related Threats
CVE-2025-22834: CWE-665 Improper Initialization in AMI AptioV
MediumCVE-2025-22830: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in AMI AptioV
HighCVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.