Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27380: CWE-79 – Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) in Altium AES

0
High
VulnerabilityCVE-2025-27380cvecve-2025-27380cwe-79
Published: Thu Jan 22 2026 (01/22/2026, 01:28:24 UTC)
Source: CVE Database V5
Vendor/Project: Altium
Product: AES

Description

CVE-2025-27380 is a high-severity cross-site scripting (XSS) vulnerability in Altium Enterprise Server (AES) version 7. 0. 3. It allows an authenticated attacker to inject malicious HTML/JavaScript into the Project Release feature, which executes in the context of other users' browsers. Exploitation requires user interaction and authentication but can lead to high confidentiality impact by stealing session tokens or sensitive data. The vulnerability affects all platforms running AES 7. 0. 3 and has a CVSS score of 7. 6. No known public exploits exist yet, but the vulnerability's scope and impact warrant prompt mitigation.

AI-Powered Analysis

AILast updated: 01/29/2026, 08:43:55 UTC

Technical Analysis

CVE-2025-27380 is a cross-site scripting (XSS) vulnerability categorized under CWE-79, found in Altium Enterprise Server (AES) version 7.0.3. The vulnerability arises from improper neutralization of input during web page generation in the Project Release functionality. Specifically, an authenticated attacker can craft malicious HTML content that is injected into the Project Release pages. When other users view these pages, the injected JavaScript executes in their browsers with their privileges, potentially allowing session hijacking, credential theft, or unauthorized actions within the AES web interface. The vulnerability requires the attacker to have valid credentials (low privilege required) and some user interaction (victim must view the malicious content). The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N) indicates network attack vector, low attack complexity, privileges required, user interaction required, scope changed, high confidentiality impact, low integrity impact, and no availability impact. Although no public exploits are known, the vulnerability's nature and impact on confidentiality make it a significant risk, especially in environments where sensitive design data is managed. The vulnerability affects all platforms running AES 7.0.3, which is used for managing electronic design projects and collaboration. Given the strategic importance of intellectual property in electronics design, exploitation could lead to data leakage or further compromise of enterprise networks.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, particularly for those in the electronics design, manufacturing, and engineering sectors that rely on Altium AES for project management and collaboration. Successful exploitation could lead to unauthorized disclosure of sensitive design data, intellectual property theft, and potential lateral movement within corporate networks. The confidentiality impact is high as attackers can steal session tokens or sensitive information via malicious scripts. Integrity impact is lower but still present, as attackers might perform limited unauthorized actions within the AES interface. Availability is not affected. The requirement for authentication and user interaction somewhat limits the attack surface but does not eliminate risk, especially in environments with many users and complex workflows. European companies with collaborative teams and remote access to AES are particularly vulnerable. The breach of sensitive design data could have downstream effects on product security, compliance with EU data protection regulations, and competitive positioning.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading Altium AES to a patched version once available. In the absence of an official patch, implement strict input validation and sanitization on all user-supplied content in the Project Release feature to prevent HTML/JavaScript injection. Restrict permissions to minimize the number of users who can create or modify Project Release content. Employ Content Security Policy (CSP) headers to reduce the impact of injected scripts. Conduct regular security awareness training to reduce the risk of users interacting with malicious content. Monitor AES logs and network traffic for unusual activity indicative of exploitation attempts. Consider isolating AES environments and enforcing multi-factor authentication to reduce the risk of credential compromise. Finally, coordinate with Altium support for any available workarounds or interim security controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Altium
Date Reserved
2025-02-23T21:02:12.105Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697186044623b1157c0a2c5e

Added to database: 1/22/2026, 2:05:56 AM

Last enriched: 1/29/2026, 8:43:55 AM

Last updated: 2/5/2026, 12:59:04 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats