Skip to main content

CVE-2025-43924: n/a

Medium
VulnerabilityCVE-2025-43924cvecve-2025-43924
Published: Tue Jun 03 2025 (06/03/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Cross Site Scripting vulnerability was discovered in Unicom Focal Point 7.6.1. The val parameter in SettingController (for /fp/admin/settings/loginpage) and the rootserviceurl parameter in FriendsController (for /fp/admin/settings/friends), entered by an admin, allow stored XSS.

AI-Powered Analysis

AILast updated: 07/11/2025, 03:03:51 UTC

Technical Analysis

CVE-2025-43924 is a Cross-Site Scripting (XSS) vulnerability identified in Unicom Focal Point version 7.6.1. The vulnerability resides in two parameters: the 'val' parameter within the SettingController endpoint (/fp/admin/settings/loginpage) and the 'rootserviceurl' parameter within the FriendsController endpoint (/fp/admin/settings/friends). Both parameters are accessible and modifiable by an administrator user. The flaw allows an attacker with administrative privileges to inject malicious scripts that are stored and later executed when the affected pages are accessed. This stored XSS vulnerability can lead to the execution of arbitrary JavaScript in the context of the victim's browser, potentially enabling session hijacking, privilege escalation, or the manipulation of the web application’s interface and data. The CVSS v3.1 base score is 6.1 (medium severity), reflecting that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:N) but does require user interaction (UI:R), and impacts confidentiality and integrity with a scope change (S:C). The vulnerability does not affect availability. Although exploitation requires an admin user to input the malicious payload, the scope change indicates that the impact extends beyond the initially vulnerable component, potentially affecting other parts of the system or users. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-79, which is a common and well-understood class of web application security issues related to improper neutralization of input leading to XSS.

Potential Impact

For European organizations using Unicom Focal Point 7.6.1, this vulnerability poses a moderate risk primarily due to the requirement that an attacker must have administrative access to inject malicious scripts. However, if an attacker compromises or impersonates an admin account, they could leverage this vulnerability to execute persistent XSS attacks, potentially compromising the confidentiality and integrity of sensitive project management or decision-support data managed by Focal Point. The scope change in the CVSS vector suggests that the impact could extend to other users or components, increasing the risk of lateral movement or broader compromise within the application environment. Given that Unicom Focal Point is used in sectors such as government, defense, and large enterprises for portfolio management and decision-making, exploitation could disrupt critical workflows or leak sensitive strategic information. The lack of current known exploits reduces immediate risk, but the presence of stored XSS in admin-accessible settings is a significant concern for insider threats or attackers who have gained privileged access. European organizations must consider the potential for targeted attacks, especially in regulated industries where data integrity and confidentiality are paramount.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first ensure strict access controls and monitoring on administrative accounts to prevent unauthorized access. Implement multi-factor authentication (MFA) for all admin users to reduce the risk of credential compromise. Until an official patch is released, organizations should apply input validation and output encoding on the affected parameters ('val' and 'rootserviceurl') at the application level, if possible, to neutralize malicious scripts. Web Application Firewalls (WAFs) can be configured with custom rules to detect and block suspicious payloads targeting these parameters. Regularly audit admin activity logs to detect unusual or unauthorized changes to settings pages. Additionally, organizations should isolate the Focal Point application within segmented network zones to limit the impact of any compromise. Finally, maintain up-to-date backups and have an incident response plan tailored for web application attacks involving stored XSS to quickly remediate any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-19T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff344

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/11/2025, 3:03:51 AM

Last updated: 8/12/2025, 7:59:15 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats