CVE-2025-40977: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WorkDo eCommerceGo SaaS
Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's eCommerceGo SaaS, consisting of a lack of proper validation of user input by sending a POST request to ‘/store-ticket’, using the ‘subject’ and ‘description’ parameters.
AI Analysis
Technical Summary
CVE-2025-40977 is a stored Cross-Site Scripting (XSS) vulnerability identified in WorkDo's eCommerceGo SaaS platform, affecting all versions. The vulnerability stems from improper neutralization of user-supplied input during web page generation, specifically in the handling of the 'subject' and 'description' parameters sent via POST requests to the '/store-ticket' endpoint. Because the input is not properly sanitized or encoded, malicious scripts can be injected and stored on the server, which are then executed in the browsers of users who view the affected content. This type of vulnerability can allow attackers to perform actions such as session hijacking, cookie theft, defacement, or redirecting users to malicious sites. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low attack complexity (AC:L), does not require privileges (PR:L) but does require user interaction (UI:P). The impact on confidentiality, integrity, and availability is limited but present, with low scope and impact on confidentiality and integrity, and no impact on availability. No patches are currently available, and no known exploits have been reported in the wild. The vulnerability was assigned by INCIBE and published in January 2026. Given the SaaS nature of the product, the vulnerability could affect multiple tenants and users simultaneously if exploited.
Potential Impact
For European organizations using WorkDo eCommerceGo SaaS, this vulnerability poses a risk of client-side attacks that can compromise user sessions, steal sensitive information such as authentication tokens, or perform unauthorized actions on behalf of users. This can lead to reputational damage, loss of customer trust, and potential regulatory consequences under GDPR if personal data is compromised. The stored nature of the XSS increases risk as malicious payloads persist and affect multiple users over time. Since the SaaS platform is likely used by eCommerce businesses, attackers could leverage this vulnerability to manipulate transactions, inject fraudulent content, or disrupt customer interactions. The medium severity indicates a moderate risk, but the widespread use of SaaS in Europe and the critical nature of eCommerce platforms amplify the potential impact. Organizations may also face increased phishing or social engineering risks if attackers use the vulnerability to inject deceptive content.
Mitigation Recommendations
Organizations should implement strict input validation and sanitization on the server side for the 'subject' and 'description' parameters in the '/store-ticket' endpoint to neutralize any malicious scripts. Employing context-aware output encoding (e.g., HTML entity encoding) before rendering user input in web pages is critical to prevent script execution. Applying Content Security Policy (CSP) headers can reduce the impact of XSS by restricting the sources of executable scripts. Monitoring and logging ticket submissions for suspicious patterns can help detect exploitation attempts early. Since no patches are currently available, organizations should work with WorkDo to prioritize patch development and deployment. Additionally, educating users about the risks of interacting with unexpected or suspicious content can reduce the likelihood of successful exploitation. Regular security assessments and penetration testing of the SaaS environment can help identify residual or related vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-40977: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WorkDo eCommerceGo SaaS
Description
Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's eCommerceGo SaaS, consisting of a lack of proper validation of user input by sending a POST request to ‘/store-ticket’, using the ‘subject’ and ‘description’ parameters.
AI-Powered Analysis
Technical Analysis
CVE-2025-40977 is a stored Cross-Site Scripting (XSS) vulnerability identified in WorkDo's eCommerceGo SaaS platform, affecting all versions. The vulnerability stems from improper neutralization of user-supplied input during web page generation, specifically in the handling of the 'subject' and 'description' parameters sent via POST requests to the '/store-ticket' endpoint. Because the input is not properly sanitized or encoded, malicious scripts can be injected and stored on the server, which are then executed in the browsers of users who view the affected content. This type of vulnerability can allow attackers to perform actions such as session hijacking, cookie theft, defacement, or redirecting users to malicious sites. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low attack complexity (AC:L), does not require privileges (PR:L) but does require user interaction (UI:P). The impact on confidentiality, integrity, and availability is limited but present, with low scope and impact on confidentiality and integrity, and no impact on availability. No patches are currently available, and no known exploits have been reported in the wild. The vulnerability was assigned by INCIBE and published in January 2026. Given the SaaS nature of the product, the vulnerability could affect multiple tenants and users simultaneously if exploited.
Potential Impact
For European organizations using WorkDo eCommerceGo SaaS, this vulnerability poses a risk of client-side attacks that can compromise user sessions, steal sensitive information such as authentication tokens, or perform unauthorized actions on behalf of users. This can lead to reputational damage, loss of customer trust, and potential regulatory consequences under GDPR if personal data is compromised. The stored nature of the XSS increases risk as malicious payloads persist and affect multiple users over time. Since the SaaS platform is likely used by eCommerce businesses, attackers could leverage this vulnerability to manipulate transactions, inject fraudulent content, or disrupt customer interactions. The medium severity indicates a moderate risk, but the widespread use of SaaS in Europe and the critical nature of eCommerce platforms amplify the potential impact. Organizations may also face increased phishing or social engineering risks if attackers use the vulnerability to inject deceptive content.
Mitigation Recommendations
Organizations should implement strict input validation and sanitization on the server side for the 'subject' and 'description' parameters in the '/store-ticket' endpoint to neutralize any malicious scripts. Employing context-aware output encoding (e.g., HTML entity encoding) before rendering user input in web pages is critical to prevent script execution. Applying Content Security Policy (CSP) headers can reduce the impact of XSS by restricting the sources of executable scripts. Monitoring and logging ticket submissions for suspicious patterns can help detect exploitation attempts early. Since no patches are currently available, organizations should work with WorkDo to prioritize patch development and deployment. Additionally, educating users about the risks of interacting with unexpected or suspicious content can reduce the likelihood of successful exploitation. Regular security assessments and penetration testing of the SaaS environment can help identify residual or related vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:08:23.193Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6964dd45da2266e83875f33f
Added to database: 1/12/2026, 11:38:45 AM
Last enriched: 1/12/2026, 11:53:26 AM
Last updated: 1/12/2026, 10:30:46 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22804: CWE-269: Improper Privilege Management in Termix-SSH Termix
HighCVE-2026-22800: CWE-352: Cross-Site Request Forgery (CSRF) in THM-Health PILOS
LowCVE-2026-22794: CWE-346: Origin Validation Error in appsmithorg appsmith
CriticalCVE-2026-22798: CWE-532: Insertion of Sensitive Information into Log File in softwarepub hermes
MediumCVE-2025-29329: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.