Skip to main content

CVE-2025-28245: n/a

Medium
VulnerabilityCVE-2025-28245cvecve-2025-28245
Published: Thu Jul 10 2025 (07/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross-site scripting (XSS) vulnerability in Alteryx Server 2023.1.1.460 allows remote attackers to inject arbitrary web script or HTML via the notification body.

AI-Powered Analysis

AILast updated: 07/17/2025, 21:01:11 UTC

Technical Analysis

CVE-2025-28245 is a cross-site scripting (XSS) vulnerability identified in Alteryx Server version 2023.1.1.460. This vulnerability allows remote attackers to inject arbitrary web scripts or HTML code through the notification body component of the server. XSS vulnerabilities occur when an application includes untrusted data in a web page without proper validation or escaping, enabling attackers to execute malicious scripts in the context of the victim's browser. In this case, the injection point is the notification body, which is likely rendered in the user interface of Alteryx Server. The CVSS 3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be performed remotely over the network without privileges, requires user interaction (such as clicking a crafted notification), and impacts confidentiality and integrity with a scope change. The vulnerability is classified under CWE-79, which is the standard identifier for XSS issues. No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. The vulnerability could allow attackers to steal session tokens, perform actions on behalf of users, or manipulate displayed content, potentially leading to further compromise of user accounts or data leakage within the Alteryx Server environment.

Potential Impact

For European organizations using Alteryx Server 2023.1.1.460, this vulnerability poses a risk primarily to the confidentiality and integrity of data processed or visualized through the platform. Alteryx Server is widely used for data analytics and workflow automation, often handling sensitive business intelligence and operational data. Exploitation could allow attackers to execute malicious scripts in the context of authenticated users, potentially leading to session hijacking, unauthorized data access, or manipulation of analytics results. This could undermine trust in data integrity and confidentiality, disrupt business processes, and expose organizations to regulatory compliance risks under GDPR if personal or sensitive data is involved. The requirement for user interaction means phishing or social engineering tactics might be used to trigger the exploit. While availability is not directly impacted, the indirect consequences of data manipulation or unauthorized access could have operational and reputational effects. Given the medium severity and lack of known exploits, the immediate risk is moderate but should be addressed promptly to prevent escalation.

Mitigation Recommendations

European organizations should implement the following specific mitigation steps: 1) Immediately review and monitor any notifications generated by Alteryx Server for suspicious or unexpected content, especially those containing HTML or script-like elements. 2) Restrict or sanitize user input that can influence notification content, applying strict input validation and output encoding to neutralize potential script injections. 3) Educate users about the risk of interacting with unexpected or suspicious notifications to reduce the likelihood of successful user interaction exploitation. 4) Deploy web application firewalls (WAF) with rules targeting XSS attack patterns on the Alteryx Server interface. 5) Monitor logs for unusual activity or repeated attempts to inject scripts via notifications. 6) Engage with Alteryx support or vendor channels to obtain patches or updates as soon as they become available, and plan for rapid deployment. 7) Consider isolating Alteryx Server access to trusted networks and users to reduce exposure. 8) Implement Content Security Policy (CSP) headers if possible to restrict script execution contexts within the application.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-11T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68700df4a83201eaaca957d1

Added to database: 7/10/2025, 7:01:08 PM

Last enriched: 7/17/2025, 9:01:11 PM

Last updated: 8/15/2025, 3:52:20 PM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats