Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27208: Vulnerability in Revive Revive Adserver

0
Medium
VulnerabilityCVE-2025-27208cvecve-2025-27208
Published: Thu Oct 30 2025 (10/30/2025, 23:32:11 UTC)
Source: CVE Database V5
Vendor/Project: Revive
Product: Revive Adserver

Description

A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Revive Adserver version 5.5.2. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and execute injected JavaScript code in the context of the victim's browser. The session cookie cannot be accessed, but a number of other operations could be performed. The vulnerability is present in the admin-search.php file and can be exploited via the compact parameter.

AI-Powered Analysis

AILast updated: 10/30/2025, 23:57:49 UTC

Technical Analysis

CVE-2025-27208 is a reflected Cross-Site Scripting (XSS) vulnerability affecting Revive Adserver version 5.5.2. The flaw exists in the admin-search.php component, specifically through the 'compact' parameter, which does not properly sanitize user input. This allows an attacker to craft a malicious URL containing JavaScript code that executes in the context of a user’s browser when they access the URL. The vulnerability is reflected, meaning the malicious script is embedded in the URL and reflected back by the server in the response. Exploitation requires the victim to have access to the Revive Adserver user interface and to click on the crafted link, thus user interaction is necessary. While the session cookie is protected from theft, the attacker can still perform other malicious actions such as manipulating the UI, conducting phishing attacks, or exploiting other browser-based vulnerabilities within the context of the user’s session. The vulnerability has a CVSS v3.0 base score of 6.3, reflecting medium severity, with attack vector as network (remote), low attack complexity, no privileges required, but user interaction needed. No public exploits have been reported yet, but the presence of this vulnerability in a widely used ad-serving platform poses a risk to organizations relying on this software for digital advertising management. The vulnerability was reserved in February 2025 and published in October 2025, indicating a recent discovery. The lack of a patch link suggests that a fix may not yet be available, increasing the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those heavily reliant on Revive Adserver for managing digital advertising campaigns. Successful exploitation could lead to unauthorized script execution in the browsers of administrative users, potentially enabling attackers to manipulate ad content, redirect users to malicious sites, or conduct social engineering attacks. Although session cookies are not exposed, the ability to execute arbitrary JavaScript can still compromise the integrity of the adserver’s management interface and potentially lead to further compromise of internal systems if combined with other vulnerabilities. This could result in reputational damage, loss of advertising revenue, and exposure to regulatory penalties under GDPR if user data is indirectly affected. The medium severity rating indicates a moderate risk, but the requirement for user interaction and access to the admin interface limits the attack surface somewhat. However, given the strategic importance of digital advertising in Europe’s economy and the prevalence of Revive Adserver in small to medium enterprises, the threat should not be underestimated.

Mitigation Recommendations

Organizations should immediately verify if they are running Revive Adserver version 5.5.2 and restrict access to the administrative interface to trusted networks and users only. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. User training to recognize suspicious URLs and phishing attempts is critical since exploitation requires user interaction. Monitoring web server logs for unusual requests to admin-search.php with suspicious 'compact' parameter values can help detect attempted exploitation. If a patch becomes available from the vendor, it should be applied promptly. In the absence of a patch, consider deploying a Web Application Firewall (WAF) with custom rules to sanitize or block requests containing suspicious payloads targeting the 'compact' parameter. Additionally, multi-factor authentication (MFA) on the admin interface can reduce the risk of unauthorized access if credentials are compromised. Regular security audits and vulnerability scanning of the adserver environment are recommended to identify and remediate any other weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-02-20T01:00:01.798Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6903f7a3aebfcd5474a4473c

Added to database: 10/30/2025, 11:41:23 PM

Last enriched: 10/30/2025, 11:57:49 PM

Last updated: 11/1/2025, 1:23:10 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats