Skip to main content

CVE-2025-25090: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Dreamstime Dreamstime Stock Photos

High
VulnerabilityCVE-2025-25090cvecve-2025-25090cwe-79
Published: Mon Mar 03 2025 (03/03/2025, 13:30:22 UTC)
Source: CVE Database V5
Vendor/Project: Dreamstime
Product: Dreamstime Stock Photos

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dreamstime Dreamstime Stock Photos dreamstime-stock-photos allows Reflected XSS.This issue affects Dreamstime Stock Photos: from n/a through 4.1.

AI-Powered Analysis

AILast updated: 07/11/2025, 07:49:07 UTC

Technical Analysis

CVE-2025-25090 is a high-severity reflected Cross-Site Scripting (XSS) vulnerability identified in the Dreamstime Stock Photos platform, affecting versions up to 4.1. This vulnerability arises due to improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the application fails to adequately sanitize or encode input parameters before reflecting them back in the HTTP response, allowing an attacker to inject malicious scripts. When a victim user interacts with a crafted URL or input, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The CVSS 3.1 base score of 7.1 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is low to moderate, as the attacker can steal limited information or manipulate user interactions but cannot directly compromise the server. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may rely on vendor updates or temporary workarounds. The vulnerability was reserved in early February 2025 and published in March 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations using Dreamstime Stock Photos, this vulnerability poses a tangible risk primarily to end-users who access the platform via web browsers. Potential impacts include theft of user session cookies, leading to account compromise, unauthorized access to user data, or manipulation of user actions such as uploading or downloading content. Organizations relying on Dreamstime for digital assets may face reputational damage if their users are targeted or if attackers leverage the platform to distribute malicious payloads. Additionally, if Dreamstime is integrated into internal workflows or content management systems, the reflected XSS could be exploited to pivot attacks internally. The cross-site scripting vulnerability could also be leveraged in phishing campaigns targeting European users, exploiting trust in the Dreamstime brand. Although no active exploits are reported, the high CVSS score and the common nature of XSS attacks warrant proactive measures. The impact is more pronounced for organizations with a large user base or those in sectors with high regulatory scrutiny around data protection, such as finance, healthcare, and government entities within Europe.

Mitigation Recommendations

European organizations should implement a multi-layered approach to mitigate this vulnerability. First, monitor Dreamstime vendor communications closely for official patches or updates addressing CVE-2025-25090 and apply them promptly. Until patches are available, consider restricting or filtering user inputs that interact with Dreamstime URLs or embedded content to prevent injection of malicious scripts. Employ web application firewalls (WAFs) with custom rules to detect and block reflected XSS payloads targeting Dreamstime endpoints. Educate users about the risks of clicking on suspicious links, especially those purporting to come from Dreamstime or related services. For organizations integrating Dreamstime content into internal systems, validate and sanitize all external inputs rigorously. Additionally, implement Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing Dreamstime content. Regularly audit logs for unusual activity or attempted exploitation patterns. Finally, ensure endpoint security solutions are updated to detect and prevent exploitation attempts that leverage this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-02-03T13:34:21.523Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683ee1ec182aa0cae27396ee

Added to database: 6/3/2025, 11:52:12 AM

Last enriched: 7/11/2025, 7:49:07 AM

Last updated: 8/5/2025, 4:29:46 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats