Skip to main content

CVE-2025-46437: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tayoricom Tayori Form

High
VulnerabilityCVE-2025-46437cvecve-2025-46437cwe-79
Published: Fri May 23 2025 (05/23/2025, 12:43:48 UTC)
Source: CVE
Vendor/Project: tayoricom
Product: Tayori Form

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tayoricom Tayori Form allows Reflected XSS. This issue affects Tayori Form: from n/a through 1.2.9.

AI-Powered Analysis

AILast updated: 07/08/2025, 23:40:20 UTC

Technical Analysis

CVE-2025-46437 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the Tayori Form product developed by tayoricom. The vulnerability arises due to improper neutralization of input during web page generation, classified under CWE-79. Specifically, the flaw allows an attacker to inject malicious scripts into web pages generated by Tayori Form, which are then reflected back to users without adequate sanitization or encoding. This reflected XSS can be triggered remotely without requiring authentication (AV:N/PR:N), but it does require user interaction (UI:R), such as clicking a crafted link or submitting a specially crafted form. The vulnerability affects versions up to 1.2.9, with no earlier versions specified. The CVSS 3.1 base score is 7.1, indicating high severity, with impacts on confidentiality, integrity, and availability (C:L/I:L/A:L) and a scope change (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the ease of exploitation combined with the potential for session hijacking, credential theft, or execution of arbitrary scripts in the context of the victim's browser makes this a significant threat. The lack of available patches at the time of publication increases the urgency for mitigation. This vulnerability is particularly concerning for web applications that rely on Tayori Form for collecting user input, as attackers can leverage it to steal sensitive data, perform phishing attacks, or pivot to further compromise the affected systems or users.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Many businesses and public sector entities use web forms for customer interaction, data collection, and service delivery. Exploitation of this reflected XSS vulnerability could lead to unauthorized disclosure of personal data, violating GDPR requirements and potentially resulting in regulatory fines and reputational damage. The ability to execute scripts in users' browsers can facilitate session hijacking, enabling attackers to impersonate legitimate users and gain unauthorized access to sensitive systems or data. This risk is amplified in sectors such as finance, healthcare, and government, where data sensitivity and compliance obligations are high. Additionally, the reflected nature of the XSS means phishing campaigns can be more convincing, increasing the likelihood of successful social engineering attacks. The scope change indicated in the CVSS vector suggests that the vulnerability could affect multiple components or users beyond the initial entry point, potentially leading to broader compromise within an organization's IT environment.

Mitigation Recommendations

Given the absence of official patches at the time of disclosure, European organizations should implement immediate compensating controls. First, input validation and output encoding should be enforced at the application layer to neutralize malicious scripts. Web application firewalls (WAFs) can be configured with custom rules to detect and block typical XSS payloads targeting Tayori Form endpoints. Organizations should conduct thorough code reviews and penetration testing focused on input handling in Tayori Form implementations. User education campaigns to raise awareness about phishing and suspicious links can reduce the risk of successful exploitation. Monitoring and logging of web traffic for unusual patterns or repeated attempts to inject scripts should be enhanced. Where feasible, organizations should isolate or sandbox the affected web forms to limit the scope of potential attacks. Finally, organizations should maintain close communication with tayoricom for updates on patches or official remediation guidance and plan for prompt deployment once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-24T14:22:09.615Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306f8e0acd01a2492723b3

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/8/2025, 11:40:20 PM

Last updated: 7/30/2025, 4:09:29 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats