Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25035: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Jalios JPlatform

0
High
VulnerabilityCVE-2025-25035cvecve-2025-25035cwe-79
Published: Fri Mar 21 2025 (03/21/2025, 19:02:39 UTC)
Source: CVE Database V5
Vendor/Project: Jalios
Product: JPlatform

Description

Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in Jalios JPlatform 10 allows for Reflected XSS and Stored XSS.This issue affects JPlatform 10: before 10.0.8 (SP8), before 10.0.7 (SP7), before 10.0.6 (SP6) and Jalios Workplace 6.2, Jalios Workplace 6.1, Jalios Workplace 6.0, and Jalios Workplace 5.3 to 5.5

AI-Powered Analysis

AILast updated: 11/19/2025, 20:43:20 UTC

Technical Analysis

CVE-2025-25035 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79 that affects Jalios JPlatform 10 versions before 10.0.8 (SP8), 10.0.7 (SP7), 10.0.6 (SP6), and Jalios Workplace versions 5.3 through 6.2. The vulnerability stems from improper neutralization of user-supplied input during web page generation, allowing malicious scripts to be injected and executed in the context of other users’ browsers. Both reflected and stored XSS attack vectors are possible, meaning attackers can craft malicious links or inject persistent scripts into the platform. The CVSS v3.1 score is 7.3 (high), with an attack vector of network (remote), low attack complexity, requiring low privileges and user interaction. Successful exploitation compromises confidentiality and integrity by enabling session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the victim user. Availability is not impacted. Although no exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread use of Jalios products in enterprise collaboration environments. The issue affects multiple versions, indicating a need for comprehensive patching and mitigation strategies.

Potential Impact

For European organizations, this vulnerability can lead to significant data breaches, especially in sectors relying on Jalios JPlatform and Workplace for internal collaboration and document management. Attackers exploiting this XSS flaw can steal session cookies, impersonate users, access sensitive corporate information, or perform unauthorized actions within the platform. This can result in loss of intellectual property, exposure of confidential communications, and potential compliance violations under GDPR due to unauthorized data access. The risk is heightened in organizations with large user bases and extensive use of Jalios portals for daily operations. While availability is unaffected, the impact on confidentiality and integrity can disrupt business processes and damage organizational reputation. The absence of known active exploits provides a window for proactive defense, but the ease of exploitation and high impact necessitate urgent remediation.

Mitigation Recommendations

Organizations should immediately inventory their use of Jalios JPlatform and Workplace versions to identify affected instances. Once vendor patches are released, they must be applied promptly to remediate the vulnerability. In the interim, implement strict input validation and output encoding on all user-supplied data to prevent script injection. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Educate users about the risks of clicking on suspicious links to reduce the likelihood of successful reflected XSS attacks. Monitor web application logs for unusual activity indicative of XSS exploitation attempts. Consider employing Web Application Firewalls (WAF) with rules targeting XSS patterns specific to Jalios platforms. Regularly review and update security configurations and conduct penetration testing focused on XSS vulnerabilities to ensure defenses remain effective.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-01-31T18:32:36.214Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691e29f04d0ffcb40bb6a619

Added to database: 11/19/2025, 8:34:56 PM

Last enriched: 11/19/2025, 8:43:20 PM

Last updated: 11/19/2025, 10:49:40 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats