Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40976: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WorkDo TicketGo

0
Medium
VulnerabilityCVE-2025-40976cvecve-2025-40976cwe-79
Published: Mon Jan 12 2026 (01/12/2026, 11:27:20 UTC)
Source: CVE Database V5
Vendor/Project: WorkDo
Product: TicketGo

Description

Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's TicketGo, consisting of a lack of proper validation of user input by sending a POST request to ‘/ticketgo-saas/home’, using the ‘description’ parameter.

AI-Powered Analysis

AILast updated: 01/12/2026, 11:53:37 UTC

Technical Analysis

CVE-2025-40976 identifies a stored Cross-Site Scripting (XSS) vulnerability in WorkDo's TicketGo product affecting all versions. The vulnerability is due to improper neutralization of user-supplied input in the 'description' parameter of a POST request to the endpoint '/ticketgo-saas/home'. Specifically, the application fails to sanitize or encode input correctly, allowing malicious JavaScript code to be stored on the server and subsequently executed in the browsers of users who view the affected content. This type of vulnerability falls under CWE-79 and is a common web application security issue that can lead to session hijacking, theft of sensitive information, or execution of unauthorized actions within the victim's session context. The CVSS 4.0 vector indicates the attack can be performed remotely without authentication (AV:N, PR:L means low privileges required), but user interaction is necessary (UI:P) for the malicious script to execute. The vulnerability impacts confidentiality and integrity with limited availability impact. No patches or known exploits are currently available, but the presence of this vulnerability in all versions of TicketGo means that any deployment is at risk. The vulnerability was assigned by INCIBE and published in January 2026. The lack of proper input validation highlights a need for improved secure coding practices in the affected product.

Potential Impact

For European organizations, exploitation of this stored XSS vulnerability could lead to significant risks including session hijacking, unauthorized access to sensitive data, and potential lateral movement within internal networks if attackers leverage stolen credentials or tokens. Organizations in sectors such as finance, healthcare, and government that rely on TicketGo for ticketing or task management may face confidentiality breaches and integrity violations. Although availability impact is low, the reputational damage and compliance risks (e.g., GDPR violations due to data exposure) could be substantial. The medium CVSS score reflects moderate ease of exploitation combined with impactful consequences. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trigger the exploit. European entities using TicketGo without mitigations are vulnerable to targeted attacks, especially if attackers craft payloads to exploit specific organizational workflows.

Mitigation Recommendations

Organizations should immediately implement strict input validation and output encoding on the 'description' parameter to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of potential XSS payloads. Conduct comprehensive code reviews and security testing focusing on user input handling in TicketGo. If possible, isolate or sandbox the TicketGo application to limit lateral movement in case of compromise. Educate users to recognize suspicious links or unexpected content that could trigger XSS attacks. Monitor web application logs for unusual POST requests to '/ticketgo-saas/home' and anomalous user behavior. Since no official patches are currently available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this endpoint. Engage with WorkDo for updates and patches and plan for timely application once released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:08:23.193Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6964dd45da2266e83875f33c

Added to database: 1/12/2026, 11:38:45 AM

Last enriched: 1/12/2026, 11:53:37 AM

Last updated: 1/12/2026, 4:38:24 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats