CVE-2025-35034: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Medical Informatics Engineering Enterprise Health
Medical Informatics Engineering Enterprise Health has a reflected cross site scripting vulnerability in the 'portlet_user_id' URL parameter. A remote, unauthenticated attacker can craft a URL that can execute arbitrary JavaScript in the victim's browser. This issue is fixed as of 2025-03-14.
AI Analysis
Technical Summary
CVE-2025-35034 identifies a reflected cross-site scripting vulnerability in the Medical Informatics Engineering Enterprise Health software, specifically in the 'portlet_user_id' URL parameter. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing attackers to inject malicious JavaScript code that executes in the context of the victim's browser. The attack vector is remote and requires no authentication, but user interaction is necessary as the victim must click or visit a crafted URL. Exploitation could enable attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, thereby compromising the integrity of the user interface and potentially facilitating further attacks like phishing. The vulnerability affects multiple recent releases (RC202309 through RC202503) but was patched as of March 14, 2025. The CVSS 3.1 base score of 4.3 reflects a medium severity, considering the vulnerability's network attack vector, low complexity, no privileges required, but requiring user interaction and limited impact to integrity only. No known active exploits have been reported, but the presence of this vulnerability in healthcare software is concerning due to the sensitivity of the environment and potential for social engineering. The vulnerability's fix status indicates that organizations should verify and apply updates to mitigate risk.
Potential Impact
For European organizations, particularly those in the healthcare sector using Medical Informatics Engineering's Enterprise Health software, this vulnerability poses a risk of client-side attacks that could undermine user trust and system integrity. While it does not directly compromise patient data confidentiality or system availability, attackers could leverage XSS to hijack user sessions, manipulate displayed content, or redirect users to malicious sites, potentially facilitating phishing or malware delivery. Given the critical nature of healthcare operations and regulatory requirements such as GDPR, even limited integrity compromises can have significant reputational and compliance consequences. The vulnerability's exploitation could disrupt clinical workflows or lead to unauthorized actions performed under a legitimate user's session. The requirement for user interaction somewhat limits the attack scope but does not eliminate risk, especially in environments where users may be targeted via phishing campaigns. Therefore, the impact is primarily on the integrity of user interactions and the trustworthiness of the healthcare application interface.
Mitigation Recommendations
1. Apply the official patch released on or after March 14, 2025, for all affected versions of Enterprise Health immediately to remediate the vulnerability. 2. Implement web application firewalls (WAFs) with rules specifically designed to detect and block reflected XSS attacks targeting the 'portlet_user_id' parameter. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 4. Conduct user awareness training focused on recognizing and avoiding suspicious URLs and phishing attempts that could exploit this vulnerability. 5. Regularly audit and monitor web application logs for unusual URL parameters or patterns indicative of attempted XSS exploitation. 6. Where possible, enforce input validation and output encoding on all user-controllable parameters beyond vendor patches to provide defense-in-depth. 7. Coordinate with Medical Informatics Engineering support to confirm patch deployment and receive updates on any emerging threats or exploit attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-35034: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Medical Informatics Engineering Enterprise Health
Description
Medical Informatics Engineering Enterprise Health has a reflected cross site scripting vulnerability in the 'portlet_user_id' URL parameter. A remote, unauthenticated attacker can craft a URL that can execute arbitrary JavaScript in the victim's browser. This issue is fixed as of 2025-03-14.
AI-Powered Analysis
Technical Analysis
CVE-2025-35034 identifies a reflected cross-site scripting vulnerability in the Medical Informatics Engineering Enterprise Health software, specifically in the 'portlet_user_id' URL parameter. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing attackers to inject malicious JavaScript code that executes in the context of the victim's browser. The attack vector is remote and requires no authentication, but user interaction is necessary as the victim must click or visit a crafted URL. Exploitation could enable attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, thereby compromising the integrity of the user interface and potentially facilitating further attacks like phishing. The vulnerability affects multiple recent releases (RC202309 through RC202503) but was patched as of March 14, 2025. The CVSS 3.1 base score of 4.3 reflects a medium severity, considering the vulnerability's network attack vector, low complexity, no privileges required, but requiring user interaction and limited impact to integrity only. No known active exploits have been reported, but the presence of this vulnerability in healthcare software is concerning due to the sensitivity of the environment and potential for social engineering. The vulnerability's fix status indicates that organizations should verify and apply updates to mitigate risk.
Potential Impact
For European organizations, particularly those in the healthcare sector using Medical Informatics Engineering's Enterprise Health software, this vulnerability poses a risk of client-side attacks that could undermine user trust and system integrity. While it does not directly compromise patient data confidentiality or system availability, attackers could leverage XSS to hijack user sessions, manipulate displayed content, or redirect users to malicious sites, potentially facilitating phishing or malware delivery. Given the critical nature of healthcare operations and regulatory requirements such as GDPR, even limited integrity compromises can have significant reputational and compliance consequences. The vulnerability's exploitation could disrupt clinical workflows or lead to unauthorized actions performed under a legitimate user's session. The requirement for user interaction somewhat limits the attack scope but does not eliminate risk, especially in environments where users may be targeted via phishing campaigns. Therefore, the impact is primarily on the integrity of user interactions and the trustworthiness of the healthcare application interface.
Mitigation Recommendations
1. Apply the official patch released on or after March 14, 2025, for all affected versions of Enterprise Health immediately to remediate the vulnerability. 2. Implement web application firewalls (WAFs) with rules specifically designed to detect and block reflected XSS attacks targeting the 'portlet_user_id' parameter. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 4. Conduct user awareness training focused on recognizing and avoiding suspicious URLs and phishing attempts that could exploit this vulnerability. 5. Regularly audit and monitor web application logs for unusual URL parameters or patterns indicative of attempted XSS exploitation. 6. Where possible, enforce input validation and output encoding on all user-controllable parameters beyond vendor patches to provide defense-in-depth. 7. Coordinate with Medical Informatics Engineering support to confirm patch deployment and receive updates on any emerging threats or exploit attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.404Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dae7e1c05da5c004a42960
Added to database: 9/29/2025, 8:11:13 PM
Last enriched: 10/7/2025, 12:45:44 AM
Last updated: 11/14/2025, 3:25:23 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9479: Out of bounds read in Google Chrome
UnknownCVE-2025-13107: Inappropriate implementation in Google Chrome
UnknownCVE-2025-13102: Inappropriate implementation in Google Chrome
UnknownCVE-2025-13097: Inappropriate implementation in Google Chrome
UnknownCVE-2025-12904: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in otacke SNORDIAN's H5PxAPIkatchu
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.