CVE-2025-40703: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ACDH-CH OpenAtlas
Cross-Site Scripting (XSS) vulnerability in OpenAtlas v8.9.0 from the Austrian Centre for Digital Humanities and Cultural Heritage (ACDH-CH), due to inadequate validation of user input when a POST request is sent. The vulnerabilities could allow a remote user to send specially crafted queries to an authenticated user and steal their session cookie details, via the "/insert/group" petition, "name" and "alias-0” parameters.
AI Analysis
Technical Summary
CVE-2025-40703 is a Cross-Site Scripting (XSS) vulnerability identified in version 8.9.0 of OpenAtlas, a software product developed by the Austrian Centre for Digital Humanities and Cultural Heritage (ACDH-CH). The vulnerability arises from improper neutralization of user input during web page generation, specifically when processing POST requests to the "/insert/group" endpoint. The affected parameters are "name" and "alias-0", which do not adequately validate or sanitize user-supplied input. This flaw allows a remote attacker to craft malicious queries that, when executed by an authenticated user, can inject arbitrary scripts into the web application context. The primary risk is the theft of session cookies, which can lead to session hijacking and unauthorized access to user accounts. The vulnerability requires the attacker to send a specially crafted POST request and relies on user interaction (the victim must be authenticated and access the malicious payload). The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required for the attacker, but user interaction needed. The vulnerability does not impact confidentiality, integrity, or availability directly but compromises session security and user trust. No known exploits are currently in the wild, and no patches have been released yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS attacks.
Potential Impact
For European organizations, especially those involved in digital humanities, cultural heritage, or academic research that utilize OpenAtlas, this vulnerability poses a significant risk to user session security. An attacker exploiting this flaw could hijack authenticated sessions, potentially gaining unauthorized access to sensitive research data, user profiles, or administrative functions. This could lead to data leakage, manipulation of cultural heritage records, or disruption of collaborative research activities. The impact is heightened in environments where OpenAtlas is integrated with other institutional systems or where users have elevated privileges. Additionally, the exploitation of this vulnerability could damage the reputation of institutions by undermining user trust and exposing them to compliance risks under GDPR, particularly if personal data is compromised through session hijacking. Although the vulnerability does not directly affect system availability or data integrity, the indirect consequences of unauthorized access and data exposure are considerable.
Mitigation Recommendations
Organizations should immediately review their use of OpenAtlas version 8.9.0 and implement compensating controls until an official patch is released. Specific recommendations include: 1) Implement strict input validation and output encoding on the server side for the "name" and "alias-0" parameters to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3) Enforce secure cookie attributes such as HttpOnly and Secure flags to reduce the risk of cookie theft via XSS. 4) Conduct user awareness training to recognize suspicious links or requests that could trigger XSS attacks. 5) Monitor web application logs for unusual POST requests to the "/insert/group" endpoint and implement anomaly detection to identify potential exploitation attempts. 6) Limit user privileges and session durations to minimize the window of opportunity for attackers. 7) If feasible, isolate OpenAtlas instances within segmented network zones to reduce lateral movement risks. Organizations should also maintain close communication with ACDH-CH for timely patch releases and apply updates promptly once available.
Affected Countries
Austria, Germany, France, United Kingdom, Netherlands, Italy, Spain, Switzerland
CVE-2025-40703: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ACDH-CH OpenAtlas
Description
Cross-Site Scripting (XSS) vulnerability in OpenAtlas v8.9.0 from the Austrian Centre for Digital Humanities and Cultural Heritage (ACDH-CH), due to inadequate validation of user input when a POST request is sent. The vulnerabilities could allow a remote user to send specially crafted queries to an authenticated user and steal their session cookie details, via the "/insert/group" petition, "name" and "alias-0” parameters.
AI-Powered Analysis
Technical Analysis
CVE-2025-40703 is a Cross-Site Scripting (XSS) vulnerability identified in version 8.9.0 of OpenAtlas, a software product developed by the Austrian Centre for Digital Humanities and Cultural Heritage (ACDH-CH). The vulnerability arises from improper neutralization of user input during web page generation, specifically when processing POST requests to the "/insert/group" endpoint. The affected parameters are "name" and "alias-0", which do not adequately validate or sanitize user-supplied input. This flaw allows a remote attacker to craft malicious queries that, when executed by an authenticated user, can inject arbitrary scripts into the web application context. The primary risk is the theft of session cookies, which can lead to session hijacking and unauthorized access to user accounts. The vulnerability requires the attacker to send a specially crafted POST request and relies on user interaction (the victim must be authenticated and access the malicious payload). The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required for the attacker, but user interaction needed. The vulnerability does not impact confidentiality, integrity, or availability directly but compromises session security and user trust. No known exploits are currently in the wild, and no patches have been released yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS attacks.
Potential Impact
For European organizations, especially those involved in digital humanities, cultural heritage, or academic research that utilize OpenAtlas, this vulnerability poses a significant risk to user session security. An attacker exploiting this flaw could hijack authenticated sessions, potentially gaining unauthorized access to sensitive research data, user profiles, or administrative functions. This could lead to data leakage, manipulation of cultural heritage records, or disruption of collaborative research activities. The impact is heightened in environments where OpenAtlas is integrated with other institutional systems or where users have elevated privileges. Additionally, the exploitation of this vulnerability could damage the reputation of institutions by undermining user trust and exposing them to compliance risks under GDPR, particularly if personal data is compromised through session hijacking. Although the vulnerability does not directly affect system availability or data integrity, the indirect consequences of unauthorized access and data exposure are considerable.
Mitigation Recommendations
Organizations should immediately review their use of OpenAtlas version 8.9.0 and implement compensating controls until an official patch is released. Specific recommendations include: 1) Implement strict input validation and output encoding on the server side for the "name" and "alias-0" parameters to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 3) Enforce secure cookie attributes such as HttpOnly and Secure flags to reduce the risk of cookie theft via XSS. 4) Conduct user awareness training to recognize suspicious links or requests that could trigger XSS attacks. 5) Monitor web application logs for unusual POST requests to the "/insert/group" endpoint and implement anomaly detection to identify potential exploitation attempts. 6) Limit user privileges and session durations to minimize the window of opportunity for attackers. 7) If feasible, isolate OpenAtlas instances within segmented network zones to reduce lateral movement risks. Organizations should also maintain close communication with ACDH-CH for timely patch releases and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T08:38:18.261Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b19364ad5a09ad0077554a
Added to database: 8/29/2025, 11:47:48 AM
Last enriched: 8/29/2025, 12:03:18 PM
Last updated: 8/29/2025, 12:03:18 PM
Views: 2
Related Threats
CVE-2025-9647: Cross Site Scripting in mtons mblog
MediumCVE-2025-9646: Cross Site Scripting in O2OA
MediumCVE-2025-9645: SQL Injection in itsourcecode Apartment Management System
MediumCVE-2025-9644: SQL Injection in itsourcecode Apartment Management System
MediumCVE-2025-9643: SQL Injection in itsourcecode Apartment Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.