Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31992: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in HCL Software MaxAI Assistant

0
Medium
VulnerabilityCVE-2025-31992cvecve-2025-31992cwe-80
Published: Sun Oct 12 2025 (10/12/2025, 05:57:03 UTC)
Source: CVE Database V5
Vendor/Project: HCL Software
Product: MaxAI Assistant

Description

HCL Unica MaxAI Assistant is susceptible to a HTML injection vulnerability. An attacker could insert special characters that are processed client-side in the context of the user's session.

AI-Powered Analysis

AILast updated: 10/12/2025, 06:19:17 UTC

Technical Analysis

CVE-2025-31992 is classified under CWE-80, indicating improper neutralization of script-related HTML tags in a web page, commonly known as a basic cross-site scripting (XSS) vulnerability. The affected product is HCL Software's MaxAI Assistant, versions 12.1.10 through 25.1. The vulnerability arises because the application fails to properly sanitize or encode special characters submitted by an attacker, which are then processed client-side within the context of an authenticated user's session. This flaw allows an attacker with at least limited privileges (PR:L) to craft malicious input that, when rendered by the victim's browser, executes arbitrary scripts. The CVSS v3.1 base score is 4.6 (medium severity), with attack vector network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), and user interaction (UI:R). The impact affects confidentiality and integrity to a limited extent but does not impact availability. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. The lack of authentication bypass or remote code execution limits the severity but still poses a risk of session hijacking, data theft, or manipulation of displayed content.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information or manipulation of data within the MaxAI Assistant interface, potentially undermining trust in automated decision-making or marketing processes supported by the software. Attackers exploiting this vulnerability might steal session cookies, perform actions on behalf of users, or inject misleading content, which could result in reputational damage or compliance issues, especially under GDPR regulations concerning data protection. Since MaxAI Assistant is used in marketing automation and AI-driven customer engagement, exploitation could disrupt customer interactions or lead to leakage of personal data. The medium severity score reflects that while the impact is not catastrophic, the risk is significant enough to warrant timely mitigation, particularly in sectors with sensitive customer data or regulatory scrutiny.

Mitigation Recommendations

Organizations should immediately review their deployment of HCL MaxAI Assistant and verify the version in use. Since no official patches are currently linked, administrators should implement input validation and output encoding at the application layer to neutralize special characters and prevent script injection. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. Limit user privileges to the minimum necessary to reduce the attack surface. Monitor logs for suspicious input patterns or anomalous user behavior indicative of attempted exploitation. Engage with HCL support for any forthcoming patches or updates. Additionally, educate users about the risks of interacting with untrusted content and ensure secure session management to mitigate session hijacking risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
HCL
Date Reserved
2025-04-01T18:46:35.961Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68eb454c3a1a0b12de17ca04

Added to database: 10/12/2025, 6:06:04 AM

Last enriched: 10/12/2025, 6:19:17 AM

Last updated: 10/12/2025, 8:44:59 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats