Skip to main content

CVE-2025-40704: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ACDH-CH OpenAtlas

Medium
VulnerabilityCVE-2025-40704cvecve-2025-40704cwe-79
Published: Fri Aug 29 2025 (08/29/2025, 11:17:06 UTC)
Source: CVE Database V5
Vendor/Project: ACDH-CH
Product: OpenAtlas

Description

Cross-Site Scripting (XSS) vulnerability in OpenAtlas v8.9.0 from the Austrian Centre for Digital Humanities and Cultural Heritage (ACDH-CH), due to inadequate validation of user input when a POST request is sent. The vulnerabilities could allow a remote user to send specially crafted queries to an authenticated user and steal their session cookie details, via  the "/insert/edition" petition, "name" parameter.

AI-Powered Analysis

AILast updated: 08/29/2025, 12:03:05 UTC

Technical Analysis

CVE-2025-40704 is a Cross-Site Scripting (XSS) vulnerability identified in version 8.9.0 of OpenAtlas, a software product developed by the Austrian Centre for Digital Humanities and Cultural Heritage (ACDH-CH). The vulnerability arises from improper neutralization of user input during web page generation, specifically when handling POST requests to the "/insert/edition" endpoint. The issue lies in the insufficient validation and sanitization of the "name" parameter, which can be manipulated by a remote attacker to inject malicious scripts. When an authenticated user interacts with a crafted query exploiting this vulnerability, the injected script can execute in their browser context, potentially allowing the attacker to steal session cookies or perform other unauthorized actions within the user's session. The vulnerability does not require the attacker to have privileges beyond unauthenticated network access, but it does require the victim to be authenticated and to interact with the malicious payload (user interaction). The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required by the attacker, but requiring user interaction and limited scope impact. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS attacks. Given the nature of OpenAtlas as a digital humanities and cultural heritage platform, the vulnerability could be leveraged to compromise user sessions, leading to unauthorized access or data theft within the application environment.

Potential Impact

For European organizations, particularly those involved in digital humanities, cultural heritage, and academic research that utilize OpenAtlas, this vulnerability poses a significant risk to the confidentiality and integrity of user sessions. Exploitation could lead to session hijacking, enabling attackers to impersonate legitimate users and access sensitive cultural or research data. This could result in unauthorized data disclosure, manipulation of records, or disruption of research activities. Given that OpenAtlas is used in academic and cultural institutions, the impact extends to reputational damage and potential loss of trust among stakeholders. Additionally, if attackers leverage stolen session cookies to escalate privileges or pivot within the network, broader organizational compromise could occur. The requirement for user interaction limits automated mass exploitation but does not eliminate targeted phishing or social engineering attacks that could be effective against staff or researchers. The medium severity score suggests moderate urgency, but the potential for lateral movement and data exposure in sensitive environments elevates the threat's importance for affected institutions.

Mitigation Recommendations

Organizations using OpenAtlas 8.9.0 should implement immediate compensating controls while awaiting an official patch. These include: 1) Enforce strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 2) Implement web application firewall (WAF) rules to detect and block malicious payloads targeting the "/insert/edition" endpoint and the "name" parameter. 3) Educate users about the risks of interacting with suspicious links or inputs, emphasizing caution with unsolicited communications. 4) Conduct regular session management reviews, including shortening session timeouts and monitoring for anomalous session activity. 5) If possible, restrict access to the OpenAtlas application to trusted networks or VPNs to reduce exposure. 6) Monitor logs for unusual POST requests or patterns indicative of exploitation attempts. 7) Coordinate with ACDH-CH for timely updates and apply patches promptly once available. 8) Consider implementing input validation and sanitization at reverse proxies or application gateways as an interim measure. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable endpoint and parameters, user behavior, and network access controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T08:38:18.261Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b19364ad5a09ad0077554e

Added to database: 8/29/2025, 11:47:48 AM

Last enriched: 8/29/2025, 12:03:05 PM

Last updated: 8/29/2025, 12:03:05 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats