Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2406: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Verisay Communication and Information Technology Industry and Trade Ltd. Co. Trizbi

0
High
VulnerabilityCVE-2025-2406cvecve-2025-2406cwe-79
Published: Thu Dec 25 2025 (12/25/2025, 13:14:49 UTC)
Source: CVE Database V5
Vendor/Project: Verisay Communication and Information Technology Industry and Trade Ltd. Co.
Product: Trizbi

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Verisay Communication and Information Technology Industry and Trade Ltd. Co. Trizbi allows Cross-Site Scripting (XSS).This issue affects Trizbi: before 2.144.4.

AI-Powered Analysis

AILast updated: 12/25/2025, 13:35:58 UTC

Technical Analysis

CVE-2025-2406 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79, discovered in the Trizbi product developed by Verisay Communication and Information Technology Industry and Trade Ltd. Co. The vulnerability exists due to improper neutralization of user-supplied input during web page generation, which allows attackers to inject and execute malicious scripts in the context of the victim’s browser. This flaw affects all versions of Trizbi prior to 2.144.4. The vulnerability has a CVSS 3.1 base score of 7.6, indicating high severity, with the vector string AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L. This means the attack can be launched remotely over the network with low attack complexity, requiring low privileges but no user interaction. The impact on confidentiality is limited, but integrity is high because attackers can manipulate data or perform unauthorized actions, and availability impact is low. The vulnerability could be exploited to perform session hijacking, defacement, or deliver malicious payloads to users of the Trizbi web interface. Although no known exploits have been reported in the wild, the presence of this vulnerability in a communication and information technology product used in industry and trade sectors raises concerns about potential targeted attacks. The lack of available patches at the time of disclosure necessitates immediate attention to mitigation strategies.

Potential Impact

For European organizations, exploitation of CVE-2025-2406 could lead to unauthorized execution of scripts within the context of trusted web applications, potentially compromising user sessions, stealing sensitive information, or enabling further attacks such as privilege escalation or lateral movement. Given Trizbi’s role in communication and information technology, attackers could manipulate critical business processes or disrupt operations. The integrity of data and transactions could be severely impacted, leading to financial losses, reputational damage, and regulatory non-compliance under GDPR if personal data is exposed. The availability impact is low but could still affect service reliability if exploited at scale. Organizations in sectors such as manufacturing, trade, and critical infrastructure that rely on Trizbi for communication or operational management are particularly vulnerable. The vulnerability’s remote exploitability and lack of user interaction requirement increase the risk of automated or widespread attacks once exploit code becomes available.

Mitigation Recommendations

European organizations should immediately inventory their Trizbi deployments and verify versions to identify vulnerable instances. Until an official patch is released, implement strict input validation and sanitization on all user-supplied data within the application environment to reduce injection risks. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS attack patterns targeting Trizbi interfaces. Enforce Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of successful script injection. Monitor web server and application logs for unusual or suspicious requests indicative of exploitation attempts. Educate users and administrators about the risks of XSS and encourage vigilance for phishing or social engineering campaigns leveraging this vulnerability. Once patches become available, prioritize timely deployment and conduct regression testing to ensure remediation. Additionally, consider network segmentation to limit access to Trizbi management interfaces and implement multi-factor authentication to reduce the risk of privilege abuse.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-03-17T12:12:53.621Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694d3ac1a66482ded1ed2a05

Added to database: 12/25/2025, 1:23:13 PM

Last enriched: 12/25/2025, 1:35:58 PM

Last updated: 12/25/2025, 3:44:23 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats