Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34141: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ETQ Reliance CG (legacy)

0
Medium
VulnerabilityCVE-2025-34141cvecve-2025-34141cwe-79cwe-116
Published: Tue Jul 22 2025 (07/22/2025, 12:35:57 UTC)
Source: CVE Database V5
Vendor/Project: ETQ
Product: Reliance CG (legacy)

Description

A reflected cross-site scripting (XSS) vulnerability exists in ETQ Reliance CG (legacy) platform within the `SQLConverterServlet` component. This vulnerability requires user interaction, such as clicking a crafted link, and may result in execution of unauthorized scripts in the user's context. The affected servlet was unnecessarily exposed to authenticated users and has since been disabled in version SE.2025.1.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:37:13 UTC

Technical Analysis

CVE-2025-34141 is a reflected cross-site scripting (XSS) vulnerability identified in the legacy ETQ Reliance CG platform, specifically within the SQLConverterServlet component. This vulnerability stems from improper neutralization of user-supplied input during web page generation, classified under CWE-79 and CWE-116. An attacker can craft a malicious URL that, when clicked by an authenticated user, causes the servlet to reflect malicious scripts back to the user's browser, leading to unauthorized script execution in the user's security context. This can result in session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability does not require any privileges or authentication beyond normal user access, but does require user interaction (clicking a malicious link). The affected servlet was unnecessarily exposed to authenticated users, increasing the attack surface. The vendor has addressed this by disabling the vulnerable servlet in version SE.2025.1. The CVSS 4.0 base score of 5.1 indicates a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and limited scope impact. No public exploits have been reported to date, but the vulnerability remains a risk for organizations using legacy versions of ETQ Reliance CG that have not applied the mitigation.

Potential Impact

For European organizations using the legacy ETQ Reliance CG platform, this vulnerability poses a risk of unauthorized script execution within authenticated user sessions. Potential impacts include theft of session tokens, unauthorized actions performed on behalf of users, and exposure of sensitive information accessible through the application. This can lead to data breaches, compliance violations (e.g., GDPR), and operational disruptions. Since the vulnerability requires user interaction, targeted phishing or social engineering campaigns could be used to exploit it. Organizations in regulated sectors such as manufacturing, pharmaceuticals, or quality management—where ETQ Reliance CG is commonly deployed—may face heightened risk. The exposure of the vulnerable servlet to authenticated users increases the attack surface, making internal threat actors or compromised users potential vectors. Although no known exploits are currently in the wild, the medium severity and ease of exploitation warrant prompt remediation to prevent future attacks.

Mitigation Recommendations

European organizations should immediately verify if they are running legacy versions of ETQ Reliance CG with the SQLConverterServlet component enabled. The primary mitigation is to upgrade to version SE.2025.1 or later, where the vulnerable servlet has been disabled. If upgrading is not immediately feasible, organizations should disable or restrict access to the SQLConverterServlet component to prevent exploitation. Implement strict input validation and output encoding on all user-supplied data to prevent reflected XSS. Employ Content Security Policy (CSP) headers to limit the impact of any injected scripts. Conduct user awareness training to reduce the risk of phishing or social engineering attacks that could trigger the vulnerability. Monitor web application logs for suspicious requests targeting the vulnerable servlet. Finally, integrate this vulnerability into vulnerability management and patching workflows to ensure timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.563Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687f881fa83201eaac1c0ebe

Added to database: 7/22/2025, 12:46:23 PM

Last enriched: 11/4/2025, 10:37:13 PM

Last updated: 12/3/2025, 7:24:39 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats