CVE-2025-40975: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WorkDo HRMGo
Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's HRMGo, consisting of a lack of proper validation of user input by sending a POST request to ‘/hrmgo/ticket/changereply’, using the ‘description’ parameter.
AI Analysis
Technical Summary
CVE-2025-40975 identifies a stored Cross-Site Scripting (XSS) vulnerability in WorkDo's HRMGo product, which is used for human resource management and ticketing. The vulnerability stems from improper neutralization of input during web page generation, specifically in the 'description' parameter of POST requests sent to the endpoint '/hrmgo/ticket/changereply'. Because the application fails to properly validate or sanitize this input, an attacker can inject malicious JavaScript code that is stored on the server and subsequently executed in the browsers of users who view the affected ticket replies. This type of stored XSS can lead to session hijacking, credential theft, unauthorized actions on behalf of users, or distribution of malware. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), does not require authentication (AT:N), but does require user interaction (UI:P). The vulnerability impacts confidentiality and integrity but has limited availability impact. All versions of HRMGo are affected, and no patches or fixes are currently published. Although no known exploits have been observed in the wild, the presence of this vulnerability in a widely used HRM tool presents a significant risk, especially if attackers target users with privileged access or sensitive data. The vulnerability was assigned by INCIBE and published in January 2026, with the reservation date in April 2025. The CWE-79 classification confirms the root cause as improper input neutralization during web page generation.
Potential Impact
For European organizations using WorkDo HRMGo, this vulnerability could lead to unauthorized script execution within the context of legitimate users, potentially exposing sensitive HR data, internal communications, and user credentials. Attackers could leverage this to escalate privileges, impersonate users, or pivot to other internal systems. The impact on confidentiality and integrity is significant, especially in sectors handling personal employee information and compliance-sensitive data under GDPR. Disruption of HR workflows or unauthorized data disclosure could result in regulatory penalties, reputational damage, and operational inefficiencies. Since the vulnerability requires user interaction but no authentication, phishing or social engineering campaigns could be used to trigger exploitation. Organizations with extensive remote workforces or those relying heavily on HRMGo for employee management are particularly at risk. The medium CVSS score reflects moderate exploitability and impact, but the potential for chained attacks or targeted exploitation in sensitive environments elevates the concern.
Mitigation Recommendations
Organizations should implement strict input validation and output encoding on the 'description' parameter to neutralize malicious scripts before rendering. Until official patches are released by WorkDo, applying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting '/hrmgo/ticket/changereply' can reduce risk. Restricting user privileges to the minimum necessary and educating users about the risks of interacting with untrusted content can limit exploitation opportunities. Monitoring logs for unusual POST requests or anomalous user behavior related to ticket replies can help detect attempted exploitation. Additionally, organizations should engage with WorkDo for timely patch releases and consider isolating HRMGo instances from broader networks to contain potential breaches. Regular security assessments and penetration testing focusing on XSS vectors in HRMGo are recommended. Finally, enforcing Content Security Policy (CSP) headers can mitigate the impact of successful XSS by restricting script execution contexts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-40975: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WorkDo HRMGo
Description
Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's HRMGo, consisting of a lack of proper validation of user input by sending a POST request to ‘/hrmgo/ticket/changereply’, using the ‘description’ parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-40975 identifies a stored Cross-Site Scripting (XSS) vulnerability in WorkDo's HRMGo product, which is used for human resource management and ticketing. The vulnerability stems from improper neutralization of input during web page generation, specifically in the 'description' parameter of POST requests sent to the endpoint '/hrmgo/ticket/changereply'. Because the application fails to properly validate or sanitize this input, an attacker can inject malicious JavaScript code that is stored on the server and subsequently executed in the browsers of users who view the affected ticket replies. This type of stored XSS can lead to session hijacking, credential theft, unauthorized actions on behalf of users, or distribution of malware. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), does not require authentication (AT:N), but does require user interaction (UI:P). The vulnerability impacts confidentiality and integrity but has limited availability impact. All versions of HRMGo are affected, and no patches or fixes are currently published. Although no known exploits have been observed in the wild, the presence of this vulnerability in a widely used HRM tool presents a significant risk, especially if attackers target users with privileged access or sensitive data. The vulnerability was assigned by INCIBE and published in January 2026, with the reservation date in April 2025. The CWE-79 classification confirms the root cause as improper input neutralization during web page generation.
Potential Impact
For European organizations using WorkDo HRMGo, this vulnerability could lead to unauthorized script execution within the context of legitimate users, potentially exposing sensitive HR data, internal communications, and user credentials. Attackers could leverage this to escalate privileges, impersonate users, or pivot to other internal systems. The impact on confidentiality and integrity is significant, especially in sectors handling personal employee information and compliance-sensitive data under GDPR. Disruption of HR workflows or unauthorized data disclosure could result in regulatory penalties, reputational damage, and operational inefficiencies. Since the vulnerability requires user interaction but no authentication, phishing or social engineering campaigns could be used to trigger exploitation. Organizations with extensive remote workforces or those relying heavily on HRMGo for employee management are particularly at risk. The medium CVSS score reflects moderate exploitability and impact, but the potential for chained attacks or targeted exploitation in sensitive environments elevates the concern.
Mitigation Recommendations
Organizations should implement strict input validation and output encoding on the 'description' parameter to neutralize malicious scripts before rendering. Until official patches are released by WorkDo, applying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting '/hrmgo/ticket/changereply' can reduce risk. Restricting user privileges to the minimum necessary and educating users about the risks of interacting with untrusted content can limit exploitation opportunities. Monitoring logs for unusual POST requests or anomalous user behavior related to ticket replies can help detect attempted exploitation. Additionally, organizations should engage with WorkDo for timely patch releases and consider isolating HRMGo instances from broader networks to contain potential breaches. Regular security assessments and penetration testing focusing on XSS vectors in HRMGo are recommended. Finally, enforcing Content Security Policy (CSP) headers can mitigate the impact of successful XSS by restricting script execution contexts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:08:23.192Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6964dd45da2266e83875f339
Added to database: 1/12/2026, 11:38:45 AM
Last enriched: 1/12/2026, 11:53:51 AM
Last updated: 1/12/2026, 8:47:27 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-51567: n/a
CriticalCVE-2025-66802: n/a
CriticalCVE-2025-68657: CWE-415: Double Free in espressif esp-usb
MediumCVE-2025-66689: n/a
MediumCVE-2026-22785: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in orval-labs orval
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.