Skip to main content

CVE-2025-34141: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ETQ Reliance CG (legacy)

Medium
VulnerabilityCVE-2025-34141cvecve-2025-34141cwe-79cwe-116
Published: Tue Jul 22 2025 (07/22/2025, 12:35:57 UTC)
Source: CVE Database V5
Vendor/Project: ETQ
Product: Reliance CG (legacy)

Description

A reflected cross-site scripting (XSS) vulnerability exists in ETQ Reliance CG (legacy) platform within the `SQLConverterServlet` component. This vulnerability requires user interaction, such as clicking a crafted link, and may result in execution of unauthorized scripts in the user's context. The affected servlet was unnecessarily exposed to authenticated users and has since been disabled in version SE.2025.1.

AI-Powered Analysis

AILast updated: 07/22/2025, 13:02:11 UTC

Technical Analysis

CVE-2025-34141 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the ETQ Reliance CG (legacy) platform, specifically within the SQLConverterServlet component. This vulnerability arises due to improper neutralization of input during web page generation, classified under CWE-79 and CWE-116. The flaw allows an attacker to craft a malicious URL that, when clicked by an authenticated user, causes unauthorized scripts to execute in the context of that user's browser session. The servlet in question was unnecessarily exposed to authenticated users, increasing the attack surface. The vulnerability requires user interaction (clicking a crafted link) but does not require any privileges or authentication to exploit, as indicated by the CVSS vector. The CVSS v4.0 base score is 5.1, categorizing it as medium severity. The vendor has addressed this issue by disabling the affected servlet in the newer SE.2025.1 version. No known exploits are currently reported in the wild. The vulnerability impacts all versions of the legacy ETQ Reliance CG platform, which is used for quality, compliance, and risk management in regulated industries. The reflected XSS can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user, depending on the victim's privileges and the nature of the injected script. Since the vulnerability requires user interaction and affects only authenticated users, the attack vector is somewhat limited but still significant given the sensitive nature of the platform's use cases.

Potential Impact

For European organizations using ETQ Reliance CG (legacy), this vulnerability poses a risk to the confidentiality and integrity of user sessions and data. Given that ETQ Reliance CG is often deployed in regulated sectors such as pharmaceuticals, manufacturing, and healthcare, exploitation could lead to unauthorized access to sensitive compliance and quality management data. This could result in regulatory non-compliance, data breaches, and operational disruptions. The reflected XSS could be leveraged to steal session cookies or perform actions on behalf of legitimate users, potentially escalating to broader system compromise if combined with other vulnerabilities or social engineering tactics. The requirement for user interaction somewhat limits mass exploitation but targeted phishing campaigns could be effective. The disabling of the vulnerable servlet in newer versions mitigates future risk, but organizations still running legacy versions remain exposed. Additionally, the exposure of the servlet to authenticated users increases risk within internal networks or remote access scenarios. The impact on availability is minimal, but the breach of confidentiality and integrity could have severe consequences in regulated environments.

Mitigation Recommendations

European organizations should prioritize upgrading to ETQ Reliance CG version SE.2025.1 or later, where the vulnerable servlet has been disabled. If immediate upgrade is not feasible, organizations should implement strict access controls to limit exposure of the SQLConverterServlet, such as network segmentation, web application firewalls (WAF) with custom rules to detect and block malicious payloads targeting this servlet, and disabling or restricting access to the servlet at the web server or application server level. User training to recognize phishing attempts and avoid clicking suspicious links is critical given the user interaction requirement. Additionally, organizations should conduct regular security assessments and penetration tests focusing on web application vulnerabilities, including XSS. Monitoring logs for unusual requests to the SQLConverterServlet and anomalous user behavior can help detect attempted exploitation. Employing Content Security Policy (CSP) headers can reduce the impact of XSS by restricting script execution contexts. Finally, organizations should review and harden authentication and session management mechanisms to minimize the impact of session hijacking attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.563Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687f881fa83201eaac1c0ebe

Added to database: 7/22/2025, 12:46:23 PM

Last enriched: 7/22/2025, 1:02:11 PM

Last updated: 7/22/2025, 8:12:36 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats