Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27349: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nurelm Get Posts

0
Medium
VulnerabilityCVE-2025-27349cvecve-2025-27349cwe-79
Published: Mon Feb 24 2025 (02/24/2025, 14:49:22 UTC)
Source: CVE Database V5
Vendor/Project: nurelm
Product: Get Posts

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nurelm Get Posts allows Stored XSS. This issue affects Get Posts: from n/a through 0.6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:02:50 UTC

Technical Analysis

CVE-2025-27349 is a stored cross-site scripting (XSS) vulnerability identified in the nurelm Get Posts product, affecting versions up to 0.6. This vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. Specifically, the application fails to properly sanitize user-supplied input before rendering it on web pages, allowing malicious scripts to be stored on the server and executed in the context of users' browsers when they view the affected pages. The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring the attacker to have some privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability, but only to a limited extent (C:L/I:L/A:L). No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of patches increases the risk of exploitation once attackers develop working exploits. The vulnerability is significant because stored XSS can lead to session hijacking, credential theft, defacement, or malware distribution. The product's market penetration is not explicitly stated, but given the nature of the vulnerability, any organization using nurelm Get Posts or similar web applications that do not sanitize inputs properly is at risk.

Potential Impact

The stored XSS vulnerability in nurelm Get Posts can have several impacts on organizations worldwide. Attackers can inject malicious scripts that execute in the browsers of users who view the compromised content, potentially leading to session hijacking, theft of sensitive information such as cookies or credentials, unauthorized actions performed on behalf of users, and distribution of malware. This can result in data breaches, loss of user trust, reputational damage, and regulatory penalties. The vulnerability affects confidentiality, integrity, and availability, albeit at a limited level, but the chained effects of an XSS attack can be severe. Since exploitation requires some privileges and user interaction, the risk is somewhat mitigated but still significant, especially in environments with many users or where users have elevated privileges. Organizations relying on nurelm Get Posts for content management or communication should consider this a priority vulnerability to address. The absence of patches increases the window of exposure, making proactive mitigations essential.

Mitigation Recommendations

To mitigate CVE-2025-27349 effectively, organizations should implement multiple layers of defense beyond generic advice: 1) Apply strict input validation on all user-supplied data, ensuring only expected characters and formats are accepted. 2) Employ context-aware output encoding/escaping when rendering data in HTML, JavaScript, or other contexts to prevent script execution. 3) Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS payloads. 4) Conduct thorough code reviews and security testing focused on input handling and output rendering in the nurelm Get Posts application. 5) Monitor application logs and user reports for suspicious activities indicative of XSS exploitation attempts. 6) Isolate the application environment and limit user privileges to reduce the impact of a successful attack. 7) Stay updated with vendor announcements for patches or security updates and apply them promptly once available. 8) Educate users about the risks of interacting with untrusted content and encourage cautious behavior. These steps combined will significantly reduce the risk and impact of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-02-21T16:46:02.627Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688301e5ad5a09ad004d878c

Added to database: 7/25/2025, 4:02:45 AM

Last enriched: 2/26/2026, 9:02:50 PM

Last updated: 3/23/2026, 3:56:15 AM

Views: 185

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses