Skip to main content

CVE-2025-40703: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ACDH-CH OpenAtlas

Medium
VulnerabilityCVE-2025-40703cvecve-2025-40703cwe-79
Published: Fri Aug 29 2025 (08/29/2025, 11:16:53 UTC)
Source: CVE Database V5
Vendor/Project: ACDH-CH
Product: OpenAtlas

Description

Cross-Site Scripting (XSS) vulnerability in OpenAtlas v8.9.0 from the Austrian Centre for Digital Humanities and Cultural Heritage (ACDH-CH), due to inadequate validation of user input when a POST request is sent. The vulnerabilities could allow a remote user to send specially crafted queries to an authenticated user and steal their session cookie details, via  the "/insert/group" petition, "name" and "alias-0” parameters.

AI-Powered Analysis

AILast updated: 08/29/2025, 12:03:18 UTC

Technical Analysis

CVE-2025-40703 is a Cross-Site Scripting (XSS) vulnerability identified in version 8.9.0 of OpenAtlas, a software product developed by the Austrian Centre for Digital Humanities and Cultural Heritage (ACDH-CH). The vulnerability arises from improper neutralization of user input during web page generation, specifically when processing POST requests to the "/insert/group" endpoint. The affected parameters are "name" and "alias-0", which do not adequately validate or sanitize user-supplied input. This flaw allows a remote attacker to craft malicious queries that, when executed by an authenticated user, can inject arbitrary scripts into the web application context. The primary risk is the theft of session cookies, which can lead to session hijacking and unauthorized access to user accounts. The vulnerability requires the attacker to send a specially crafted POST request and relies on user interaction (the victim must be authenticated and access the malicious payload). The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required for the attacker, but user interaction needed. The vulnerability does not impact confidentiality, integrity, or availability directly but compromises session security and user trust. No known exploits are currently in the wild, and no patches have been released yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS attacks.

Potential Impact

For European organizations, especially those involved in digital humanities, cultural heritage, or academic research that utilize OpenAtlas, this vulnerability poses a significant risk to user session security. An attacker exploiting this flaw could hijack authenticated sessions, potentially gaining unauthorized access to sensitive research data, user profiles, or administrative functions. This could lead to data leakage, manipulation of cultural heritage records, or disruption of collaborative research activities. The impact is heightened in environments where OpenAtlas is integrated with other institutional systems or where users have elevated privileges. Additionally, the exploitation of this vulnerability could damage the reputation of institutions by undermining user trust and exposing them to compliance risks under GDPR, particularly if personal data is compromised through session hijacking. Although the vulnerability does not directly affect system availability or data integrity, the indirect consequences of unauthorized access and data exposure are considerable.

Mitigation Recommendations

Organizations should immediately review their use of OpenAtlas version 8.9.0 and implement compensating controls until an official patch is released. Specific recommendations include: 1) Implement strict input validation and output encoding on the server side for the "name" and "alias-0" parameters to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3) Enforce secure cookie attributes such as HttpOnly and Secure flags to reduce the risk of cookie theft via XSS. 4) Conduct user awareness training to recognize suspicious links or requests that could trigger XSS attacks. 5) Monitor web application logs for unusual POST requests to the "/insert/group" endpoint and implement anomaly detection to identify potential exploitation attempts. 6) Limit user privileges and session durations to minimize the window of opportunity for attackers. 7) If feasible, isolate OpenAtlas instances within segmented network zones to reduce lateral movement risks. Organizations should also maintain close communication with ACDH-CH for timely patch releases and apply updates promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T08:38:18.261Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b19364ad5a09ad0077554a

Added to database: 8/29/2025, 11:47:48 AM

Last enriched: 8/29/2025, 12:03:18 PM

Last updated: 8/29/2025, 12:03:18 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats