Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-28380: n/a

0
Medium
VulnerabilityCVE-2025-28380cvecve-2025-28380
Published: Fri Jun 13 2025 (06/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A cross-site scripting (XSS) vulnerability in OpenC3 COSMOS before v6.0.2 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter.

AI-Powered Analysis

AILast updated: 10/28/2025, 04:15:44 UTC

Technical Analysis

CVE-2025-28380 is a cross-site scripting (XSS) vulnerability identified in OpenC3 COSMOS, a software platform used for mission operations and command and control in aerospace and defense sectors. This vulnerability exists in versions prior to 6.0.2 and allows attackers to inject arbitrary HTML or JavaScript code through a crafted payload embedded in a URL parameter. When a victim user clicks on such a maliciously crafted URL, the injected script executes in the context of the victim's browser session, potentially leading to theft of session tokens, manipulation of displayed content, or execution of unauthorized actions within the web application. The CVSS 3.1 base score is 6.1 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction (clicking the malicious link). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable component, and impacts confidentiality and integrity to a limited extent, but does not affect availability. No known public exploits have been reported yet, but the vulnerability is publicly disclosed and should be considered a risk for organizations using affected versions. The root cause is improper sanitization and validation of URL parameters, leading to injection of executable scripts in the web interface.

Potential Impact

For European organizations, especially those in aerospace, defense, and space sectors that rely on OpenC3 COSMOS for mission-critical operations, this vulnerability could lead to unauthorized disclosure of sensitive information such as session tokens or operational data, and manipulation of web interface content. Although the impact on availability is none, the confidentiality and integrity of user sessions and data could be compromised, potentially enabling further attacks or unauthorized command execution within the system. This could disrupt operational security and trust in mission control systems. The requirement for user interaction somewhat limits the attack surface but does not eliminate risk, particularly in environments where users may be targeted with phishing or social engineering campaigns. The absence of known exploits in the wild reduces immediate risk but does not preclude future exploitation attempts. European organizations must consider the potential for espionage or sabotage given the strategic importance of affected systems.

Mitigation Recommendations

The primary mitigation is to upgrade OpenC3 COSMOS to version 6.0.2 or later, where this vulnerability has been addressed. In addition, organizations should implement strict input validation and output encoding on all user-supplied data, especially URL parameters, to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. Conduct regular security training to raise awareness about phishing and social engineering attacks that could deliver malicious URLs. Monitor web application logs for suspicious URL parameter patterns indicative of attempted exploitation. Use web application firewalls (WAFs) configured to detect and block XSS payloads targeting known vulnerable endpoints. Finally, perform periodic security assessments and penetration testing focusing on client-side injection vulnerabilities to detect any residual or new issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-11T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 684c28eba8c9212743808660

Added to database: 6/13/2025, 1:34:35 PM

Last enriched: 10/28/2025, 4:15:44 AM

Last updated: 11/22/2025, 6:06:42 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats