Skip to main content

CVE-2025-47201: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Intrexx Portal Server

Medium
VulnerabilityCVE-2025-47201cvecve-2025-47201cwe-79
Published: Fri May 02 2025 (05/02/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: Intrexx
Product: Portal Server

Description

In Intrexx Portal Server before 12.0.4, multiple Velocity-Scripts are susceptible to the execution of unrequested JavaScript code in HTML, aka XSS.

AI-Powered Analysis

AILast updated: 06/26/2025, 00:15:36 UTC

Technical Analysis

CVE-2025-47201 is a medium-severity vulnerability affecting Intrexx Portal Server versions prior to 12.0.4. The issue stems from improper neutralization of input during web page generation, specifically within multiple Velocity-Scripts used by the portal server. This vulnerability is classified under CWE-79, which corresponds to Cross-site Scripting (XSS). The flaw allows an attacker to inject and execute unrequested JavaScript code in the context of the affected web application. The vulnerability requires network access (AV:N), has a high attack complexity (AC:H), requires low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability arises because the Velocity-Scripts do not properly sanitize or encode user-supplied input before embedding it into HTML pages, enabling malicious scripts to run in the browsers of users who visit the compromised pages. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user within the portal environment. Given the portal server’s role as a web-based enterprise collaboration and integration platform, exploitation could facilitate lateral movement or data exfiltration within affected organizations.

Potential Impact

For European organizations using Intrexx Portal Server, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data accessed through the portal. Attackers exploiting this XSS flaw could steal session cookies, impersonate users, or manipulate portal content, potentially leading to unauthorized access to sensitive business information. Since the portal server often integrates with internal systems and workflows, successful exploitation might enable attackers to pivot to other internal resources. The requirement for user interaction (e.g., clicking a malicious link) limits the ease of exploitation but does not eliminate risk, especially in environments with large user bases or where phishing attacks are common. The medium CVSS score reflects moderate risk; however, organizations with high-value data or regulatory obligations (e.g., GDPR compliance) should treat this vulnerability seriously to avoid data breaches and reputational damage.

Mitigation Recommendations

1. Immediate mitigation should focus on applying the vendor’s patch once available; monitor Intrexx’s official channels for updates. 2. In the interim, implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the portal’s web context. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting Velocity-Scripts. 4. Conduct user awareness training to reduce the risk of phishing or social engineering attacks that could deliver malicious payloads exploiting this XSS. 5. Review and sanitize all user inputs and outputs in custom scripts or portal extensions to ensure proper encoding and neutralization of HTML special characters. 6. Limit portal user privileges to the minimum necessary to reduce the impact of compromised accounts. 7. Monitor portal logs for unusual activity indicative of exploitation attempts, such as anomalous URL parameters or repeated script injection patterns.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-02T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec148

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/26/2025, 12:15:36 AM

Last updated: 8/11/2025, 12:21:20 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats