Skip to main content

CVE-2025-35034: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Medical Informatics Engineering Enterprise Health

Medium
VulnerabilityCVE-2025-35034cvecve-2025-35034cwe-79
Published: Mon Sep 29 2025 (09/29/2025, 20:01:58 UTC)
Source: CVE Database V5
Vendor/Project: Medical Informatics Engineering
Product: Enterprise Health

Description

Medical Informatics Engineering Enterprise Health has a reflected cross site scripting vulnerability in the 'portlet_user_id' URL parameter. A remote, unauthenticated attacker can craft a URL that can execute arbitrary JavaScript in the victim's browser. This issue is fixed as of 2025-03-14.

AI-Powered Analysis

AILast updated: 09/29/2025, 20:12:04 UTC

Technical Analysis

CVE-2025-35034 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Medical Informatics Engineering's Enterprise Health product. The vulnerability exists in the 'portlet_user_id' URL parameter, where improper neutralization of input allows an attacker to inject and execute arbitrary JavaScript code in the context of a victim's browser. This flaw is classified under CWE-79, which pertains to improper input sanitization during web page generation. The vulnerability affects multiple recent versions of the product, specifically RC202309, RC202403, RC202409, and RC202503. Exploitation requires no authentication, and an attacker can craft a malicious URL that, when visited by a user, triggers the execution of injected scripts. This can lead to session hijacking, credential theft, or other client-side attacks. The vulnerability was publicly disclosed on September 29, 2025, and fixed as of March 14, 2025. The CVSS v3.1 base score is 4.3, reflecting a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges required, but user interaction is necessary (the victim must click the malicious link). No known exploits are currently reported in the wild. The vulnerability impacts confidentiality and integrity to a limited extent but does not affect availability. The reflected nature of the XSS means the malicious payload is not stored on the server but delivered via crafted URLs, increasing the likelihood of targeted phishing or social engineering attacks against users of the affected product.

Potential Impact

For European organizations using Medical Informatics Engineering's Enterprise Health platform, this vulnerability poses a risk primarily to end users who access the affected web interfaces. Given that Enterprise Health is a medical informatics solution, the confidentiality and integrity of sensitive health data and user sessions could be compromised if attackers successfully execute XSS attacks. This could lead to unauthorized access to patient information, manipulation of displayed data, or the spread of malware via injected scripts. Although the vulnerability does not directly impact system availability, the potential for data leakage or session hijacking can have serious compliance and reputational consequences, especially under stringent European data protection regulations such as GDPR. Healthcare providers and associated entities in Europe are particularly sensitive to such risks due to the critical nature of patient data and the regulatory environment. The requirement for user interaction (clicking a malicious link) means that phishing campaigns could be an effective attack vector, increasing the threat surface. The absence of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

European organizations should prioritize updating Medical Informatics Engineering Enterprise Health to the fixed version released on or after March 14, 2025. Immediate patching is the most effective mitigation. In parallel, organizations should implement strict input validation and output encoding on all user-supplied data, particularly URL parameters like 'portlet_user_id'. Web Application Firewalls (WAFs) can be configured to detect and block suspicious input patterns indicative of XSS payloads targeting this parameter. Security awareness training should be enhanced to educate users about the risks of clicking unsolicited or suspicious links, especially in emails or messages purporting to relate to healthcare services. Additionally, Content Security Policy (CSP) headers can be deployed to restrict the execution of unauthorized scripts in browsers, mitigating the impact of any successful injection. Regular security assessments and penetration testing focusing on web interface vulnerabilities should be conducted to detect similar issues proactively. Logging and monitoring for unusual URL requests or client-side errors related to this parameter can help identify attempted exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.404Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dae7e1c05da5c004a42960

Added to database: 9/29/2025, 8:11:13 PM

Last enriched: 9/29/2025, 8:12:04 PM

Last updated: 10/2/2025, 12:33:11 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats