Skip to main content

CVE-2025-43837: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in binti76 Total Donations

High
VulnerabilityCVE-2025-43837cvecve-2025-43837cwe-79
Published: Mon May 19 2025 (05/19/2025, 18:20:33 UTC)
Source: CVE
Vendor/Project: binti76
Product: Total Donations

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in binti76 Total Donations allows Reflected XSS.This issue affects Total Donations: from n/a through 3.0.8.

AI-Powered Analysis

AILast updated: 07/11/2025, 16:46:36 UTC

Technical Analysis

CVE-2025-43837 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the binti76 Total Donations software, affecting versions up to 3.0.8. This vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the application fails to adequately sanitize or encode input parameters before including them in dynamically generated web pages, allowing an attacker to inject malicious scripts that execute in the context of a victim's browser. The vulnerability is exploitable remotely over the network without requiring authentication (AV:N/AC:L/PR:N), but it does require user interaction (UI:R), such as clicking a crafted link or visiting a malicious webpage. The scope is classified as changed (S:C), indicating that the vulnerability can affect resources beyond the vulnerable component, potentially impacting the confidentiality, integrity, and availability of the application and its users. The CVSS v3.1 base score is 7.1, reflecting a high severity due to the combination of remote exploitability, low attack complexity, and significant impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a donation management system could allow attackers to steal session cookies, perform actions on behalf of users, or redirect users to malicious sites, thereby undermining trust and potentially causing financial or reputational damage. The lack of available patches at the time of publication increases the urgency for mitigation.

Potential Impact

For European organizations using binti76 Total Donations, this vulnerability poses a significant risk, especially for non-profits, charities, and fundraising platforms that rely on this software to manage donor interactions. Exploitation could lead to unauthorized disclosure of sensitive donor information, manipulation of donation data, or redirection of users to phishing or malware sites. This can result in loss of donor trust, financial fraud, and regulatory non-compliance, particularly under the GDPR framework which mandates protection of personal data. The reflected XSS attack vector could also be leveraged to conduct broader phishing campaigns targeting European users, amplifying the impact. Additionally, the potential for session hijacking or defacement could disrupt service availability and damage organizational reputation. Given the cross-border nature of many European charities and the interconnectedness of donation platforms, the impact could cascade across multiple countries.

Mitigation Recommendations

European organizations should immediately implement input validation and output encoding controls to neutralize malicious scripts. Specifically, they should: 1) Employ context-aware output encoding (e.g., HTML entity encoding) for all user-supplied data rendered in web pages. 2) Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 3) Implement web application firewalls (WAFs) with rules targeting common XSS attack patterns to provide an additional layer of defense. 4) Conduct thorough code reviews and penetration testing focusing on input handling in the Total Donations software. 5) Monitor web traffic for suspicious activity indicative of attempted XSS exploitation. 6) Engage with the vendor or community to obtain patches or updates as soon as they become available. 7) Educate users and administrators about the risks of clicking untrusted links and the importance of reporting suspicious behavior. These steps go beyond generic advice by focusing on layered defenses and proactive monitoring tailored to the specific software and threat.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-17T17:03:58.445Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb4c9

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 4:46:36 PM

Last updated: 7/30/2025, 4:08:01 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats