CVE-2025-34141: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ETQ Reliance CG (legacy)
A reflected cross-site scripting (XSS) vulnerability exists in ETQ Reliance CG (legacy) platform within the `SQLConverterServlet` component. This vulnerability requires user interaction, such as clicking a crafted link, and may result in execution of unauthorized scripts in the user's context. The affected servlet was unnecessarily exposed to authenticated users and has since been disabled in version SE.2025.1.
AI Analysis
Technical Summary
CVE-2025-34141 is a reflected cross-site scripting (XSS) vulnerability identified in the legacy ETQ Reliance CG platform, specifically within the SQLConverterServlet component. This vulnerability stems from improper neutralization of user-supplied input during web page generation, classified under CWE-79 and CWE-116. An attacker can craft a malicious URL that, when clicked by an authenticated user, causes the servlet to reflect malicious scripts back to the user's browser, leading to unauthorized script execution in the user's security context. This can result in session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability does not require any privileges or authentication beyond normal user access, but does require user interaction (clicking a malicious link). The affected servlet was unnecessarily exposed to authenticated users, increasing the attack surface. The vendor has addressed this by disabling the vulnerable servlet in version SE.2025.1. The CVSS 4.0 base score of 5.1 indicates a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and limited scope impact. No public exploits have been reported to date, but the vulnerability remains a risk for organizations using legacy versions of ETQ Reliance CG that have not applied the mitigation.
Potential Impact
For European organizations using the legacy ETQ Reliance CG platform, this vulnerability poses a risk of unauthorized script execution within authenticated user sessions. Potential impacts include theft of session tokens, unauthorized actions performed on behalf of users, and exposure of sensitive information accessible through the application. This can lead to data breaches, compliance violations (e.g., GDPR), and operational disruptions. Since the vulnerability requires user interaction, targeted phishing or social engineering campaigns could be used to exploit it. Organizations in regulated sectors such as manufacturing, pharmaceuticals, or quality management—where ETQ Reliance CG is commonly deployed—may face heightened risk. The exposure of the vulnerable servlet to authenticated users increases the attack surface, making internal threat actors or compromised users potential vectors. Although no known exploits are currently in the wild, the medium severity and ease of exploitation warrant prompt remediation to prevent future attacks.
Mitigation Recommendations
European organizations should immediately verify if they are running legacy versions of ETQ Reliance CG with the SQLConverterServlet component enabled. The primary mitigation is to upgrade to version SE.2025.1 or later, where the vulnerable servlet has been disabled. If upgrading is not immediately feasible, organizations should disable or restrict access to the SQLConverterServlet component to prevent exploitation. Implement strict input validation and output encoding on all user-supplied data to prevent reflected XSS. Employ Content Security Policy (CSP) headers to limit the impact of any injected scripts. Conduct user awareness training to reduce the risk of phishing or social engineering attacks that could trigger the vulnerability. Monitor web application logs for suspicious requests targeting the vulnerable servlet. Finally, integrate this vulnerability into vulnerability management and patching workflows to ensure timely remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Belgium, Sweden, Switzerland
CVE-2025-34141: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ETQ Reliance CG (legacy)
Description
A reflected cross-site scripting (XSS) vulnerability exists in ETQ Reliance CG (legacy) platform within the `SQLConverterServlet` component. This vulnerability requires user interaction, such as clicking a crafted link, and may result in execution of unauthorized scripts in the user's context. The affected servlet was unnecessarily exposed to authenticated users and has since been disabled in version SE.2025.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-34141 is a reflected cross-site scripting (XSS) vulnerability identified in the legacy ETQ Reliance CG platform, specifically within the SQLConverterServlet component. This vulnerability stems from improper neutralization of user-supplied input during web page generation, classified under CWE-79 and CWE-116. An attacker can craft a malicious URL that, when clicked by an authenticated user, causes the servlet to reflect malicious scripts back to the user's browser, leading to unauthorized script execution in the user's security context. This can result in session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability does not require any privileges or authentication beyond normal user access, but does require user interaction (clicking a malicious link). The affected servlet was unnecessarily exposed to authenticated users, increasing the attack surface. The vendor has addressed this by disabling the vulnerable servlet in version SE.2025.1. The CVSS 4.0 base score of 5.1 indicates a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and limited scope impact. No public exploits have been reported to date, but the vulnerability remains a risk for organizations using legacy versions of ETQ Reliance CG that have not applied the mitigation.
Potential Impact
For European organizations using the legacy ETQ Reliance CG platform, this vulnerability poses a risk of unauthorized script execution within authenticated user sessions. Potential impacts include theft of session tokens, unauthorized actions performed on behalf of users, and exposure of sensitive information accessible through the application. This can lead to data breaches, compliance violations (e.g., GDPR), and operational disruptions. Since the vulnerability requires user interaction, targeted phishing or social engineering campaigns could be used to exploit it. Organizations in regulated sectors such as manufacturing, pharmaceuticals, or quality management—where ETQ Reliance CG is commonly deployed—may face heightened risk. The exposure of the vulnerable servlet to authenticated users increases the attack surface, making internal threat actors or compromised users potential vectors. Although no known exploits are currently in the wild, the medium severity and ease of exploitation warrant prompt remediation to prevent future attacks.
Mitigation Recommendations
European organizations should immediately verify if they are running legacy versions of ETQ Reliance CG with the SQLConverterServlet component enabled. The primary mitigation is to upgrade to version SE.2025.1 or later, where the vulnerable servlet has been disabled. If upgrading is not immediately feasible, organizations should disable or restrict access to the SQLConverterServlet component to prevent exploitation. Implement strict input validation and output encoding on all user-supplied data to prevent reflected XSS. Employ Content Security Policy (CSP) headers to limit the impact of any injected scripts. Conduct user awareness training to reduce the risk of phishing or social engineering attacks that could trigger the vulnerability. Monitor web application logs for suspicious requests targeting the vulnerable servlet. Finally, integrate this vulnerability into vulnerability management and patching workflows to ensure timely remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.563Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687f881fa83201eaac1c0ebe
Added to database: 7/22/2025, 12:46:23 PM
Last enriched: 11/4/2025, 10:37:13 PM
Last updated: 12/3/2025, 7:24:39 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13486: CWE-94 Improper Control of Generation of Code ('Code Injection') in hwk-fr Advanced Custom Fields: Extended
CriticalCVE-2025-12954: CWE-639 Authorization Bypass Through User-Controlled Key in Timetable and Event Schedule by MotoPress
UnknownCVE-2025-13495: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpmanageninja FluentCart A New Era of eCommerce – Faster, Lighter, and Simpler
MediumCVE-2025-12585: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mxchat MxChat – AI Chatbot for WordPress
MediumCVE-2025-10304: CWE-862 Missing Authorization in everestthemes Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.