CVE-2025-35996: CWE-97 in KUNBUS GmbH Revolution Pi PiCtory
KUNBUS PiCtory version 2.11.1 and earlier are vulnerable when an authenticated remote attacker crafts a special filename that can be stored by API endpoints. That filename is later transmitted to the client in order to show a list of configuration files. Due to a missing escape or sanitization, the filename could be executed as HTML script tag resulting in a cross-site-scripting attack.
AI Analysis
Technical Summary
CVE-2025-35996 is a critical cross-site scripting (XSS) vulnerability identified in KUNBUS GmbH's Revolution Pi PiCtory software, specifically affecting version 2.11.1 and earlier. The vulnerability arises from improper handling of filenames submitted via API endpoints by authenticated remote users. An attacker with valid credentials can craft a malicious filename containing executable HTML script tags. This filename is stored by the system and later transmitted back to clients when displaying a list of configuration files. Due to the lack of proper escaping or sanitization of these filenames, the embedded script code executes in the context of the client’s browser, enabling a stored XSS attack. The vulnerability is classified under CWE-97 (Improper Neutralization of Script-Related HTML Tags in a Web Page), which highlights failures in sanitizing input that can lead to script injection. The CVSS v3.1 base score is 9.0, reflecting a critical severity with network attack vector, low attack complexity, required privileges (authenticated user), user interaction needed, and a scope change that affects confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to its potential to execute arbitrary scripts in clients’ browsers, which can lead to session hijacking, credential theft, or further exploitation within the network. The affected product, Revolution Pi PiCtory, is used in industrial automation environments, particularly in industrial control systems (ICS) and Internet of Things (IoT) deployments, where secure configuration management is critical. The vulnerability’s exploitation could undermine trust in configuration data, enable lateral movement, or disrupt industrial processes by compromising user sessions or injecting malicious commands via the web interface.
Potential Impact
For European organizations, especially those operating in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability presents a high risk. Exploitation could allow attackers to execute malicious scripts in the browsers of authorized users, potentially leading to theft of authentication tokens, unauthorized command execution, or manipulation of configuration files. This can result in operational disruptions, data breaches, and loss of control over industrial processes. Given the critical nature of industrial control systems in sectors such as energy, transportation, and manufacturing across Europe, successful exploitation could have cascading effects on supply chains and public safety. The requirement for authentication limits exposure to some extent; however, insider threats or compromised credentials could facilitate attacks. The vulnerability’s impact on confidentiality, integrity, and availability is severe, as attackers could gain persistent footholds or disrupt system operations. Additionally, the scope change in the CVSS vector indicates that the vulnerability affects components beyond the initially vulnerable module, potentially impacting multiple systems or users within an organization.
Mitigation Recommendations
1. Immediate patching or upgrading to a fixed version of Revolution Pi PiCtory once available from KUNBUS GmbH is the most effective mitigation. 2. Until patches are released, implement strict input validation and output encoding on all API endpoints handling filenames to neutralize script tags and other HTML elements. This can be done by deploying web application firewalls (WAFs) with custom rules to detect and block malicious payloads in filenames. 3. Restrict access to the PiCtory API endpoints to trusted networks and users, minimizing the attack surface. 4. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 5. Conduct regular security audits and monitoring of logs for unusual filename submissions or suspicious user activity. 6. Educate users about the risks of XSS and encourage cautious behavior when interacting with configuration file lists or web interfaces. 7. Employ Content Security Policy (CSP) headers on the web interface to limit the execution of unauthorized scripts in clients’ browsers. 8. Segment industrial networks to isolate critical control systems from general IT networks, reducing the impact of potential exploitation. These measures combined will reduce the likelihood and impact of exploitation until a vendor patch is available.
Affected Countries
Germany, France, Italy, Netherlands, Belgium, Poland, Czech Republic
CVE-2025-35996: CWE-97 in KUNBUS GmbH Revolution Pi PiCtory
Description
KUNBUS PiCtory version 2.11.1 and earlier are vulnerable when an authenticated remote attacker crafts a special filename that can be stored by API endpoints. That filename is later transmitted to the client in order to show a list of configuration files. Due to a missing escape or sanitization, the filename could be executed as HTML script tag resulting in a cross-site-scripting attack.
AI-Powered Analysis
Technical Analysis
CVE-2025-35996 is a critical cross-site scripting (XSS) vulnerability identified in KUNBUS GmbH's Revolution Pi PiCtory software, specifically affecting version 2.11.1 and earlier. The vulnerability arises from improper handling of filenames submitted via API endpoints by authenticated remote users. An attacker with valid credentials can craft a malicious filename containing executable HTML script tags. This filename is stored by the system and later transmitted back to clients when displaying a list of configuration files. Due to the lack of proper escaping or sanitization of these filenames, the embedded script code executes in the context of the client’s browser, enabling a stored XSS attack. The vulnerability is classified under CWE-97 (Improper Neutralization of Script-Related HTML Tags in a Web Page), which highlights failures in sanitizing input that can lead to script injection. The CVSS v3.1 base score is 9.0, reflecting a critical severity with network attack vector, low attack complexity, required privileges (authenticated user), user interaction needed, and a scope change that affects confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to its potential to execute arbitrary scripts in clients’ browsers, which can lead to session hijacking, credential theft, or further exploitation within the network. The affected product, Revolution Pi PiCtory, is used in industrial automation environments, particularly in industrial control systems (ICS) and Internet of Things (IoT) deployments, where secure configuration management is critical. The vulnerability’s exploitation could undermine trust in configuration data, enable lateral movement, or disrupt industrial processes by compromising user sessions or injecting malicious commands via the web interface.
Potential Impact
For European organizations, especially those operating in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability presents a high risk. Exploitation could allow attackers to execute malicious scripts in the browsers of authorized users, potentially leading to theft of authentication tokens, unauthorized command execution, or manipulation of configuration files. This can result in operational disruptions, data breaches, and loss of control over industrial processes. Given the critical nature of industrial control systems in sectors such as energy, transportation, and manufacturing across Europe, successful exploitation could have cascading effects on supply chains and public safety. The requirement for authentication limits exposure to some extent; however, insider threats or compromised credentials could facilitate attacks. The vulnerability’s impact on confidentiality, integrity, and availability is severe, as attackers could gain persistent footholds or disrupt system operations. Additionally, the scope change in the CVSS vector indicates that the vulnerability affects components beyond the initially vulnerable module, potentially impacting multiple systems or users within an organization.
Mitigation Recommendations
1. Immediate patching or upgrading to a fixed version of Revolution Pi PiCtory once available from KUNBUS GmbH is the most effective mitigation. 2. Until patches are released, implement strict input validation and output encoding on all API endpoints handling filenames to neutralize script tags and other HTML elements. This can be done by deploying web application firewalls (WAFs) with custom rules to detect and block malicious payloads in filenames. 3. Restrict access to the PiCtory API endpoints to trusted networks and users, minimizing the attack surface. 4. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 5. Conduct regular security audits and monitoring of logs for unusual filename submissions or suspicious user activity. 6. Educate users about the risks of XSS and encourage cautious behavior when interacting with configuration file lists or web interfaces. 7. Employ Content Security Policy (CSP) headers on the web interface to limit the execution of unauthorized scripts in clients’ browsers. 8. Segment industrial networks to isolate critical control systems from general IT networks, reducing the impact of potential exploitation. These measures combined will reduce the likelihood and impact of exploitation until a vendor patch is available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2025-04-17T20:46:42.189Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbec19b
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 6/25/2025, 10:59:58 PM
Last updated: 7/29/2025, 3:22:17 AM
Views: 12
Related Threats
CVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-8940: Buffer Overflow in Tenda AC20
HighCVE-2025-8939: Buffer Overflow in Tenda AC20
HighCVE-2025-50518: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.