CVE-2025-27379: CWE-79 Cross-Site Scripting (XSS) in Altium AES
CVE-2025-27379 is a stored cross-site scripting (XSS) vulnerability in Altium AES version 7. 0. 3, specifically in the BOM Viewer component. An authenticated attacker can inject arbitrary JavaScript code into the Description field of a schematic, which executes when the BOM Viewer renders the content. This vulnerability requires user interaction and authentication but can lead to high availability impact and limited confidentiality and integrity impact. The CVSS score is 6. 8, indicating a medium severity. No known exploits are currently reported in the wild. European organizations using Altium AES 7. 0.
AI Analysis
Technical Summary
CVE-2025-27379 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 found in Altium AES version 7.0.3. The vulnerability exists in the Bill of Materials (BOM) Viewer component, where the Description field of a schematic does not properly sanitize user input. An authenticated attacker with at least limited privileges can inject arbitrary JavaScript code into this field. When other users view the affected schematic in the BOM Viewer, the malicious script executes in their browser context. This can lead to various impacts including session hijacking, unauthorized actions on behalf of the user, or denial of service by disrupting the availability of the BOM Viewer. The vulnerability requires authentication and user interaction (viewing the schematic), which limits its exploitation scope but does not eliminate risk. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H) reflects network attack vector, low attack complexity, privileges required, user interaction required, unchanged scope, low confidentiality and integrity impact, but high availability impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. This vulnerability is particularly relevant for organizations relying on Altium AES for electronic design automation, as it could be leveraged for lateral movement or disruption within engineering teams.
Potential Impact
For European organizations, the impact of CVE-2025-27379 can be significant in sectors that rely heavily on Altium AES for electronic design and manufacturing, such as automotive, aerospace, telecommunications, and industrial equipment. Exploitation could lead to unauthorized script execution within the BOM Viewer, potentially allowing attackers to steal session tokens, perform actions on behalf of users, or disrupt availability of critical design data. This could delay product development cycles, cause intellectual property exposure, or introduce integrity issues in design documentation. The requirement for authentication and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks, especially insider threats or compromised accounts. Given the interconnected nature of supply chains in Europe, a successful attack could propagate risks downstream to partners and customers. Availability impact is rated high, which could affect operational continuity in engineering workflows. Confidentiality and integrity impacts are lower but still relevant due to potential data exposure or manipulation.
Mitigation Recommendations
1. Upgrade to a patched version of Altium AES once available; monitor vendor advisories closely. 2. Implement strict access controls limiting who can authenticate and edit schematics, especially the Description field. 3. Enforce input validation and sanitization on the Description field to prevent injection of malicious scripts. 4. Use Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in the BOM Viewer interface. 5. Monitor logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected script injections or anomalous access patterns. 6. Educate users to be cautious when viewing schematics from untrusted sources or unknown authors. 7. Consider network segmentation to isolate Altium AES servers from broader corporate networks to limit lateral movement. 8. Employ multi-factor authentication to reduce risk from compromised credentials. 9. Regularly back up design data to enable recovery in case of availability disruption. 10. If patching is delayed, consider disabling or restricting access to the BOM Viewer component temporarily.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Finland, Belgium
CVE-2025-27379: CWE-79 Cross-Site Scripting (XSS) in Altium AES
Description
CVE-2025-27379 is a stored cross-site scripting (XSS) vulnerability in Altium AES version 7. 0. 3, specifically in the BOM Viewer component. An authenticated attacker can inject arbitrary JavaScript code into the Description field of a schematic, which executes when the BOM Viewer renders the content. This vulnerability requires user interaction and authentication but can lead to high availability impact and limited confidentiality and integrity impact. The CVSS score is 6. 8, indicating a medium severity. No known exploits are currently reported in the wild. European organizations using Altium AES 7. 0.
AI-Powered Analysis
Technical Analysis
CVE-2025-27379 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 found in Altium AES version 7.0.3. The vulnerability exists in the Bill of Materials (BOM) Viewer component, where the Description field of a schematic does not properly sanitize user input. An authenticated attacker with at least limited privileges can inject arbitrary JavaScript code into this field. When other users view the affected schematic in the BOM Viewer, the malicious script executes in their browser context. This can lead to various impacts including session hijacking, unauthorized actions on behalf of the user, or denial of service by disrupting the availability of the BOM Viewer. The vulnerability requires authentication and user interaction (viewing the schematic), which limits its exploitation scope but does not eliminate risk. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H) reflects network attack vector, low attack complexity, privileges required, user interaction required, unchanged scope, low confidentiality and integrity impact, but high availability impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. This vulnerability is particularly relevant for organizations relying on Altium AES for electronic design automation, as it could be leveraged for lateral movement or disruption within engineering teams.
Potential Impact
For European organizations, the impact of CVE-2025-27379 can be significant in sectors that rely heavily on Altium AES for electronic design and manufacturing, such as automotive, aerospace, telecommunications, and industrial equipment. Exploitation could lead to unauthorized script execution within the BOM Viewer, potentially allowing attackers to steal session tokens, perform actions on behalf of users, or disrupt availability of critical design data. This could delay product development cycles, cause intellectual property exposure, or introduce integrity issues in design documentation. The requirement for authentication and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks, especially insider threats or compromised accounts. Given the interconnected nature of supply chains in Europe, a successful attack could propagate risks downstream to partners and customers. Availability impact is rated high, which could affect operational continuity in engineering workflows. Confidentiality and integrity impacts are lower but still relevant due to potential data exposure or manipulation.
Mitigation Recommendations
1. Upgrade to a patched version of Altium AES once available; monitor vendor advisories closely. 2. Implement strict access controls limiting who can authenticate and edit schematics, especially the Description field. 3. Enforce input validation and sanitization on the Description field to prevent injection of malicious scripts. 4. Use Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in the BOM Viewer interface. 5. Monitor logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected script injections or anomalous access patterns. 6. Educate users to be cautious when viewing schematics from untrusted sources or unknown authors. 7. Consider network segmentation to isolate Altium AES servers from broader corporate networks to limit lateral movement. 8. Employ multi-factor authentication to reduce risk from compromised credentials. 9. Regularly back up design data to enable recovery in case of availability disruption. 10. If patching is delayed, consider disabling or restricting access to the BOM Viewer component temporarily.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Altium
- Date Reserved
- 2025-02-23T21:02:12.105Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697186044623b1157c0a2c5b
Added to database: 1/22/2026, 2:05:56 AM
Last enriched: 1/29/2026, 8:43:25 AM
Last updated: 2/5/2026, 11:30:01 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1654: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pkthree Peter’s Date Countdown
MediumCVE-2026-1294: CWE-918 Server-Side Request Forgery (SSRF) in bplugins All In One Image Viewer Block – Gutenberg block to create image viewer with hyperlink
HighCVE-2026-1271: CWE-639 Authorization Bypass Through User-Controlled Key in metagauss ProfileGrid – User Profiles, Groups and Communities
MediumCVE-2025-14079: CWE-862 Missing Authorization in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumCVE-2026-1319: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themeisle Robin Image Optimizer – Unlimited Image Optimization & WebP Converter
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.