CVE-2025-27208: Vulnerability in Revive Revive Adserver
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Revive Adserver version 5.5.2. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and execute injected JavaScript code in the context of the victim's browser. The session cookie cannot be accessed, but a number of other operations could be performed. The vulnerability is present in the admin-search.php file and can be exploited via the compact parameter.
AI Analysis
Technical Summary
CVE-2025-27208 is a reflected Cross-Site Scripting (XSS) vulnerability affecting Revive Adserver version 5.5.2. The flaw exists in the admin-search.php component, specifically through the 'compact' parameter, which does not properly sanitize user input. This allows an attacker to craft a malicious URL containing JavaScript code that executes in the context of a user’s browser when they access the URL. The vulnerability is reflected, meaning the malicious script is embedded in the URL and reflected back by the server in the response. Exploitation requires the victim to have access to the Revive Adserver user interface and to click on the crafted link, thus user interaction is necessary. While the session cookie is protected from theft, the attacker can still perform other malicious actions such as manipulating the UI, conducting phishing attacks, or exploiting other browser-based vulnerabilities within the context of the user’s session. The vulnerability has a CVSS v3.0 base score of 6.3, reflecting medium severity, with attack vector as network (remote), low attack complexity, no privileges required, but user interaction needed. No public exploits have been reported yet, but the presence of this vulnerability in a widely used ad-serving platform poses a risk to organizations relying on this software for digital advertising management. The vulnerability was reserved in February 2025 and published in October 2025, indicating a recent discovery. The lack of a patch link suggests that a fix may not yet be available, increasing the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those heavily reliant on Revive Adserver for managing digital advertising campaigns. Successful exploitation could lead to unauthorized script execution in the browsers of administrative users, potentially enabling attackers to manipulate ad content, redirect users to malicious sites, or conduct social engineering attacks. Although session cookies are not exposed, the ability to execute arbitrary JavaScript can still compromise the integrity of the adserver’s management interface and potentially lead to further compromise of internal systems if combined with other vulnerabilities. This could result in reputational damage, loss of advertising revenue, and exposure to regulatory penalties under GDPR if user data is indirectly affected. The medium severity rating indicates a moderate risk, but the requirement for user interaction and access to the admin interface limits the attack surface somewhat. However, given the strategic importance of digital advertising in Europe’s economy and the prevalence of Revive Adserver in small to medium enterprises, the threat should not be underestimated.
Mitigation Recommendations
Organizations should immediately verify if they are running Revive Adserver version 5.5.2 and restrict access to the administrative interface to trusted networks and users only. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. User training to recognize suspicious URLs and phishing attempts is critical since exploitation requires user interaction. Monitoring web server logs for unusual requests to admin-search.php with suspicious 'compact' parameter values can help detect attempted exploitation. If a patch becomes available from the vendor, it should be applied promptly. In the absence of a patch, consider deploying a Web Application Firewall (WAF) with custom rules to sanitize or block requests containing suspicious payloads targeting the 'compact' parameter. Additionally, multi-factor authentication (MFA) on the admin interface can reduce the risk of unauthorized access if credentials are compromised. Regular security audits and vulnerability scanning of the adserver environment are recommended to identify and remediate any other weaknesses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-27208: Vulnerability in Revive Revive Adserver
Description
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Revive Adserver version 5.5.2. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and execute injected JavaScript code in the context of the victim's browser. The session cookie cannot be accessed, but a number of other operations could be performed. The vulnerability is present in the admin-search.php file and can be exploited via the compact parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-27208 is a reflected Cross-Site Scripting (XSS) vulnerability affecting Revive Adserver version 5.5.2. The flaw exists in the admin-search.php component, specifically through the 'compact' parameter, which does not properly sanitize user input. This allows an attacker to craft a malicious URL containing JavaScript code that executes in the context of a user’s browser when they access the URL. The vulnerability is reflected, meaning the malicious script is embedded in the URL and reflected back by the server in the response. Exploitation requires the victim to have access to the Revive Adserver user interface and to click on the crafted link, thus user interaction is necessary. While the session cookie is protected from theft, the attacker can still perform other malicious actions such as manipulating the UI, conducting phishing attacks, or exploiting other browser-based vulnerabilities within the context of the user’s session. The vulnerability has a CVSS v3.0 base score of 6.3, reflecting medium severity, with attack vector as network (remote), low attack complexity, no privileges required, but user interaction needed. No public exploits have been reported yet, but the presence of this vulnerability in a widely used ad-serving platform poses a risk to organizations relying on this software for digital advertising management. The vulnerability was reserved in February 2025 and published in October 2025, indicating a recent discovery. The lack of a patch link suggests that a fix may not yet be available, increasing the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those heavily reliant on Revive Adserver for managing digital advertising campaigns. Successful exploitation could lead to unauthorized script execution in the browsers of administrative users, potentially enabling attackers to manipulate ad content, redirect users to malicious sites, or conduct social engineering attacks. Although session cookies are not exposed, the ability to execute arbitrary JavaScript can still compromise the integrity of the adserver’s management interface and potentially lead to further compromise of internal systems if combined with other vulnerabilities. This could result in reputational damage, loss of advertising revenue, and exposure to regulatory penalties under GDPR if user data is indirectly affected. The medium severity rating indicates a moderate risk, but the requirement for user interaction and access to the admin interface limits the attack surface somewhat. However, given the strategic importance of digital advertising in Europe’s economy and the prevalence of Revive Adserver in small to medium enterprises, the threat should not be underestimated.
Mitigation Recommendations
Organizations should immediately verify if they are running Revive Adserver version 5.5.2 and restrict access to the administrative interface to trusted networks and users only. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. User training to recognize suspicious URLs and phishing attempts is critical since exploitation requires user interaction. Monitoring web server logs for unusual requests to admin-search.php with suspicious 'compact' parameter values can help detect attempted exploitation. If a patch becomes available from the vendor, it should be applied promptly. In the absence of a patch, consider deploying a Web Application Firewall (WAF) with custom rules to sanitize or block requests containing suspicious payloads targeting the 'compact' parameter. Additionally, multi-factor authentication (MFA) on the admin interface can reduce the risk of unauthorized access if credentials are compromised. Regular security audits and vulnerability scanning of the adserver environment are recommended to identify and remediate any other weaknesses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-02-20T01:00:01.798Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6903f7a3aebfcd5474a4473c
Added to database: 10/30/2025, 11:41:23 PM
Last enriched: 10/30/2025, 11:57:49 PM
Last updated: 11/1/2025, 1:23:10 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-36367: CWE-862 Missing Authorization
HighCVE-2025-6990: CWE-94 Improper Control of Generation of Code ('Code Injection') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
HighCVE-2025-6988: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
MediumCVE-2025-6574: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
HighCVE-2025-12171: CWE-434 Unrestricted Upload of File with Dangerous Type in anthonyeden RESTful Content Syndication
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.