CVE-2025-35029: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Medical Informatics Engineering Enterprise Health
Medical Informatics Engineering Enterprise Health has a stored cross site scripting vulnerability that allows an authenticated attacker to add arbitrary content in the 'Demographic Information' page. This content will be rendered and executed when a victim accesses it. This issue is fixed as of 2025-03-14.
AI Analysis
Technical Summary
CVE-2025-35029 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in Medical Informatics Engineering's Enterprise Health software. The vulnerability exists in the 'Demographic Information' page, where authenticated users can inject arbitrary HTML or script content that is stored and later rendered in other users' browsers. This improper neutralization of input allows malicious scripts to execute in the context of the victim's session, potentially leading to session manipulation, defacement, or other client-side attacks. Exploitation requires the attacker to have authenticated access to the system and to trick another user into viewing the compromised page, thus involving user interaction. The vulnerability affects multiple released versions (RC202309, RC202403, RC202409, RC202503) and was addressed by a patch released on March 14, 2025. The CVSS v3.1 base score is 3.5, reflecting low severity due to limited impact on confidentiality and availability, the need for authentication, and user interaction. No known active exploits have been reported, but the risk remains for insider threats or compromised accounts. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in sensitive healthcare environments where data integrity and trust are critical.
Potential Impact
For European organizations, particularly those in the healthcare sector using Medical Informatics Engineering's Enterprise Health product, this vulnerability poses a risk to data integrity and user trust. While it does not directly compromise patient confidentiality or system availability, the ability to inject and execute arbitrary scripts can lead to session hijacking, unauthorized actions performed in the context of legitimate users, or the spread of misinformation within the system. This can disrupt clinical workflows, damage organizational reputation, and potentially violate data protection regulations such as GDPR if personal data is manipulated or exposed indirectly. The requirement for authentication and user interaction limits the scope but does not eliminate risk, especially in environments with many users and complex access privileges. European healthcare providers are increasingly targeted by cyber adversaries, making timely remediation critical to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately apply the official patch released by Medical Informatics Engineering on March 14, 2025, to all affected Enterprise Health instances. 2. Implement strict input validation and output encoding on all user-supplied data fields, especially those rendering HTML content, to prevent script injection. 3. Restrict the ability to modify demographic information to only trusted roles and monitor changes for unusual patterns. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the application. 5. Conduct regular security training for users to recognize and report suspicious content or behavior within the system. 6. Monitor logs for anomalous activities related to demographic data modifications and access patterns. 7. Use multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. 8. Review and harden session management to mitigate potential session hijacking attempts stemming from XSS exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-35029: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Medical Informatics Engineering Enterprise Health
Description
Medical Informatics Engineering Enterprise Health has a stored cross site scripting vulnerability that allows an authenticated attacker to add arbitrary content in the 'Demographic Information' page. This content will be rendered and executed when a victim accesses it. This issue is fixed as of 2025-03-14.
AI-Powered Analysis
Technical Analysis
CVE-2025-35029 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in Medical Informatics Engineering's Enterprise Health software. The vulnerability exists in the 'Demographic Information' page, where authenticated users can inject arbitrary HTML or script content that is stored and later rendered in other users' browsers. This improper neutralization of input allows malicious scripts to execute in the context of the victim's session, potentially leading to session manipulation, defacement, or other client-side attacks. Exploitation requires the attacker to have authenticated access to the system and to trick another user into viewing the compromised page, thus involving user interaction. The vulnerability affects multiple released versions (RC202309, RC202403, RC202409, RC202503) and was addressed by a patch released on March 14, 2025. The CVSS v3.1 base score is 3.5, reflecting low severity due to limited impact on confidentiality and availability, the need for authentication, and user interaction. No known active exploits have been reported, but the risk remains for insider threats or compromised accounts. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in sensitive healthcare environments where data integrity and trust are critical.
Potential Impact
For European organizations, particularly those in the healthcare sector using Medical Informatics Engineering's Enterprise Health product, this vulnerability poses a risk to data integrity and user trust. While it does not directly compromise patient confidentiality or system availability, the ability to inject and execute arbitrary scripts can lead to session hijacking, unauthorized actions performed in the context of legitimate users, or the spread of misinformation within the system. This can disrupt clinical workflows, damage organizational reputation, and potentially violate data protection regulations such as GDPR if personal data is manipulated or exposed indirectly. The requirement for authentication and user interaction limits the scope but does not eliminate risk, especially in environments with many users and complex access privileges. European healthcare providers are increasingly targeted by cyber adversaries, making timely remediation critical to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately apply the official patch released by Medical Informatics Engineering on March 14, 2025, to all affected Enterprise Health instances. 2. Implement strict input validation and output encoding on all user-supplied data fields, especially those rendering HTML content, to prevent script injection. 3. Restrict the ability to modify demographic information to only trusted roles and monitor changes for unusual patterns. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the application. 5. Conduct regular security training for users to recognize and report suspicious content or behavior within the system. 6. Monitor logs for anomalous activities related to demographic data modifications and access patterns. 7. Use multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. 8. Review and harden session management to mitigate potential session hijacking attempts stemming from XSS exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.403Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691f6f9228b41f27b434758d
Added to database: 11/20/2025, 7:44:18 PM
Last enriched: 11/20/2025, 7:45:31 PM
Last updated: 11/20/2025, 9:50:08 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13087: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Opto22 GRV-EPIC-PR1
HighCVE-2025-61138: n/a
UnknownCVE-2025-36159: CWE-117 Improper Output Neutralization for Logs in IBM Concert
MediumCVE-2025-36158: CWE-674 Uncontrolled Recursion in IBM Concert
MediumCVE-2025-36153: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in IBM Concert
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.