Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35029: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Medical Informatics Engineering Enterprise Health

0
Low
VulnerabilityCVE-2025-35029cvecve-2025-35029cwe-79
Published: Thu Nov 20 2025 (11/20/2025, 19:34:31 UTC)
Source: CVE Database V5
Vendor/Project: Medical Informatics Engineering
Product: Enterprise Health

Description

Medical Informatics Engineering Enterprise Health has a stored cross site scripting vulnerability that allows an authenticated attacker to add arbitrary content in the 'Demographic Information' page. This content will be rendered and executed when a victim accesses it. This issue is fixed as of 2025-03-14.

AI-Powered Analysis

AILast updated: 11/20/2025, 19:45:31 UTC

Technical Analysis

CVE-2025-35029 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in Medical Informatics Engineering's Enterprise Health software. The vulnerability exists in the 'Demographic Information' page, where authenticated users can inject arbitrary HTML or script content that is stored and later rendered in other users' browsers. This improper neutralization of input allows malicious scripts to execute in the context of the victim's session, potentially leading to session manipulation, defacement, or other client-side attacks. Exploitation requires the attacker to have authenticated access to the system and to trick another user into viewing the compromised page, thus involving user interaction. The vulnerability affects multiple released versions (RC202309, RC202403, RC202409, RC202503) and was addressed by a patch released on March 14, 2025. The CVSS v3.1 base score is 3.5, reflecting low severity due to limited impact on confidentiality and availability, the need for authentication, and user interaction. No known active exploits have been reported, but the risk remains for insider threats or compromised accounts. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in sensitive healthcare environments where data integrity and trust are critical.

Potential Impact

For European organizations, particularly those in the healthcare sector using Medical Informatics Engineering's Enterprise Health product, this vulnerability poses a risk to data integrity and user trust. While it does not directly compromise patient confidentiality or system availability, the ability to inject and execute arbitrary scripts can lead to session hijacking, unauthorized actions performed in the context of legitimate users, or the spread of misinformation within the system. This can disrupt clinical workflows, damage organizational reputation, and potentially violate data protection regulations such as GDPR if personal data is manipulated or exposed indirectly. The requirement for authentication and user interaction limits the scope but does not eliminate risk, especially in environments with many users and complex access privileges. European healthcare providers are increasingly targeted by cyber adversaries, making timely remediation critical to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Immediately apply the official patch released by Medical Informatics Engineering on March 14, 2025, to all affected Enterprise Health instances. 2. Implement strict input validation and output encoding on all user-supplied data fields, especially those rendering HTML content, to prevent script injection. 3. Restrict the ability to modify demographic information to only trusted roles and monitor changes for unusual patterns. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the application. 5. Conduct regular security training for users to recognize and report suspicious content or behavior within the system. 6. Monitor logs for anomalous activities related to demographic data modifications and access patterns. 7. Use multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. 8. Review and harden session management to mitigate potential session hijacking attempts stemming from XSS exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.403Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f6f9228b41f27b434758d

Added to database: 11/20/2025, 7:44:18 PM

Last enriched: 11/20/2025, 7:45:31 PM

Last updated: 11/20/2025, 9:50:08 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats