CVE-2025-27208: Vulnerability in Revive Revive Adserver
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Revive Adserver version 5.5.2. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and execute injected JavaScript code in the context of the victim's browser. The session cookie cannot be accessed, but a number of other operations could be performed. The vulnerability is present in the admin-search.php file and can be exploited via the compact parameter.
AI Analysis
Technical Summary
CVE-2025-27208 is a reflected Cross-Site Scripting (XSS) vulnerability found in Revive Adserver version 5.5.2, a widely used open-source ad serving platform. The vulnerability exists in the admin-search.php file, specifically exploitable via the 'compact' parameter. An attacker can craft a malicious URL containing JavaScript code that, when clicked by a user with access to the Revive Adserver administrative interface, causes the injected script to execute in the context of the victim's browser. This reflected XSS does not allow direct access to the session cookie, limiting the attacker's ability to hijack sessions, but it can still be leveraged to perform other malicious actions such as UI manipulation, phishing, or unauthorized operations within the user's session. The vulnerability requires user interaction (clicking the crafted URL) and does not require prior authentication, increasing the attack surface. The CVSS v3.0 score of 6.3 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security issue. Organizations running Revive Adserver 5.5.2 should be aware of this threat and implement mitigations promptly.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of data handled within the Revive Adserver platform. While session cookies are not exposed, attackers can exploit the XSS to execute arbitrary scripts, potentially leading to unauthorized actions such as altering ad campaigns, injecting malicious content into ads, or conducting phishing attacks against administrative users. This can result in reputational damage, financial loss due to manipulated advertising, and potential regulatory non-compliance under GDPR if personal data is indirectly affected. The requirement for user interaction and access to the admin interface somewhat limits the scope, but social engineering or phishing campaigns could increase exploitation likelihood. Organizations relying heavily on digital advertising platforms for revenue or marketing in Europe should consider this vulnerability a significant operational risk. The absence of known exploits in the wild provides a window for proactive defense, but the medium CVSS score indicates that exploitation could still cause meaningful disruption.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the Revive Adserver administrative interface to trusted IPs or VPNs to reduce exposure to untrusted users. 2. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the browser context. 3. Educate administrative users about the risks of clicking on unsolicited or suspicious URLs, emphasizing phishing awareness. 4. Monitor web server logs for unusual requests to admin-search.php with suspicious 'compact' parameter values. 5. If possible, upgrade to a patched version of Revive Adserver once available; in the meantime, consider applying manual input validation or sanitization on the 'compact' parameter in the admin-search.php file. 6. Employ web application firewalls (WAF) with rules to detect and block reflected XSS attempts targeting the vulnerable parameter. 7. Regularly audit and review user permissions to ensure only necessary personnel have admin interface access. 8. Conduct penetration testing focused on XSS vulnerabilities to identify and remediate similar issues proactively.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2025-27208: Vulnerability in Revive Revive Adserver
Description
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Revive Adserver version 5.5.2. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and execute injected JavaScript code in the context of the victim's browser. The session cookie cannot be accessed, but a number of other operations could be performed. The vulnerability is present in the admin-search.php file and can be exploited via the compact parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-27208 is a reflected Cross-Site Scripting (XSS) vulnerability found in Revive Adserver version 5.5.2, a widely used open-source ad serving platform. The vulnerability exists in the admin-search.php file, specifically exploitable via the 'compact' parameter. An attacker can craft a malicious URL containing JavaScript code that, when clicked by a user with access to the Revive Adserver administrative interface, causes the injected script to execute in the context of the victim's browser. This reflected XSS does not allow direct access to the session cookie, limiting the attacker's ability to hijack sessions, but it can still be leveraged to perform other malicious actions such as UI manipulation, phishing, or unauthorized operations within the user's session. The vulnerability requires user interaction (clicking the crafted URL) and does not require prior authentication, increasing the attack surface. The CVSS v3.0 score of 6.3 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security issue. Organizations running Revive Adserver 5.5.2 should be aware of this threat and implement mitigations promptly.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of data handled within the Revive Adserver platform. While session cookies are not exposed, attackers can exploit the XSS to execute arbitrary scripts, potentially leading to unauthorized actions such as altering ad campaigns, injecting malicious content into ads, or conducting phishing attacks against administrative users. This can result in reputational damage, financial loss due to manipulated advertising, and potential regulatory non-compliance under GDPR if personal data is indirectly affected. The requirement for user interaction and access to the admin interface somewhat limits the scope, but social engineering or phishing campaigns could increase exploitation likelihood. Organizations relying heavily on digital advertising platforms for revenue or marketing in Europe should consider this vulnerability a significant operational risk. The absence of known exploits in the wild provides a window for proactive defense, but the medium CVSS score indicates that exploitation could still cause meaningful disruption.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the Revive Adserver administrative interface to trusted IPs or VPNs to reduce exposure to untrusted users. 2. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the browser context. 3. Educate administrative users about the risks of clicking on unsolicited or suspicious URLs, emphasizing phishing awareness. 4. Monitor web server logs for unusual requests to admin-search.php with suspicious 'compact' parameter values. 5. If possible, upgrade to a patched version of Revive Adserver once available; in the meantime, consider applying manual input validation or sanitization on the 'compact' parameter in the admin-search.php file. 6. Employ web application firewalls (WAF) with rules to detect and block reflected XSS attempts targeting the vulnerable parameter. 7. Regularly audit and review user permissions to ensure only necessary personnel have admin interface access. 8. Conduct penetration testing focused on XSS vulnerabilities to identify and remediate similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-02-20T01:00:01.798Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6903f7a3aebfcd5474a4473c
Added to database: 10/30/2025, 11:41:23 PM
Last enriched: 12/1/2025, 8:21:45 PM
Last updated: 12/16/2025, 6:35:45 PM
Views: 89
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68155: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in vitejs vite-plugin-react
HighCVE-2025-68154: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in sebhildebrandt systeminformation
HighCVE-2025-68150: CWE-918: Server-Side Request Forgery (SSRF) in parse-community parse-server
HighCVE-2025-68146: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in tox-dev filelock
MediumCVE-2025-65592: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.