CVE-2025-47201: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Intrexx Portal Server
In Intrexx Portal Server before 12.0.4, multiple Velocity-Scripts are susceptible to the execution of unrequested JavaScript code in HTML, aka XSS.
AI Analysis
Technical Summary
CVE-2025-47201 is a medium-severity vulnerability affecting Intrexx Portal Server versions prior to 12.0.4. The issue stems from improper neutralization of input during web page generation, specifically within multiple Velocity-Scripts used by the portal server. This vulnerability is classified under CWE-79, which corresponds to Cross-site Scripting (XSS). The flaw allows an attacker to inject and execute unrequested JavaScript code in the context of the affected web application. The vulnerability requires network access (AV:N), has a high attack complexity (AC:H), requires low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability arises because the Velocity-Scripts do not properly sanitize or encode user-supplied input before embedding it into HTML pages, enabling malicious scripts to run in the browsers of users who visit the compromised pages. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user within the portal environment. Given the portal server’s role as a web-based enterprise collaboration and integration platform, exploitation could facilitate lateral movement or data exfiltration within affected organizations.
Potential Impact
For European organizations using Intrexx Portal Server, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data accessed through the portal. Attackers exploiting this XSS flaw could steal session cookies, impersonate users, or manipulate portal content, potentially leading to unauthorized access to sensitive business information. Since the portal server often integrates with internal systems and workflows, successful exploitation might enable attackers to pivot to other internal resources. The requirement for user interaction (e.g., clicking a malicious link) limits the ease of exploitation but does not eliminate risk, especially in environments with large user bases or where phishing attacks are common. The medium CVSS score reflects moderate risk; however, organizations with high-value data or regulatory obligations (e.g., GDPR compliance) should treat this vulnerability seriously to avoid data breaches and reputational damage.
Mitigation Recommendations
1. Immediate mitigation should focus on applying the vendor’s patch once available; monitor Intrexx’s official channels for updates. 2. In the interim, implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the portal’s web context. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting Velocity-Scripts. 4. Conduct user awareness training to reduce the risk of phishing or social engineering attacks that could deliver malicious payloads exploiting this XSS. 5. Review and sanitize all user inputs and outputs in custom scripts or portal extensions to ensure proper encoding and neutralization of HTML special characters. 6. Limit portal user privileges to the minimum necessary to reduce the impact of compromised accounts. 7. Monitor portal logs for unusual activity indicative of exploitation attempts, such as anomalous URL parameters or repeated script injection patterns.
Affected Countries
Germany, France, Netherlands, Belgium, Switzerland, Austria, United Kingdom
CVE-2025-47201: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Intrexx Portal Server
Description
In Intrexx Portal Server before 12.0.4, multiple Velocity-Scripts are susceptible to the execution of unrequested JavaScript code in HTML, aka XSS.
AI-Powered Analysis
Technical Analysis
CVE-2025-47201 is a medium-severity vulnerability affecting Intrexx Portal Server versions prior to 12.0.4. The issue stems from improper neutralization of input during web page generation, specifically within multiple Velocity-Scripts used by the portal server. This vulnerability is classified under CWE-79, which corresponds to Cross-site Scripting (XSS). The flaw allows an attacker to inject and execute unrequested JavaScript code in the context of the affected web application. The vulnerability requires network access (AV:N), has a high attack complexity (AC:H), requires low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability arises because the Velocity-Scripts do not properly sanitize or encode user-supplied input before embedding it into HTML pages, enabling malicious scripts to run in the browsers of users who visit the compromised pages. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user within the portal environment. Given the portal server’s role as a web-based enterprise collaboration and integration platform, exploitation could facilitate lateral movement or data exfiltration within affected organizations.
Potential Impact
For European organizations using Intrexx Portal Server, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data accessed through the portal. Attackers exploiting this XSS flaw could steal session cookies, impersonate users, or manipulate portal content, potentially leading to unauthorized access to sensitive business information. Since the portal server often integrates with internal systems and workflows, successful exploitation might enable attackers to pivot to other internal resources. The requirement for user interaction (e.g., clicking a malicious link) limits the ease of exploitation but does not eliminate risk, especially in environments with large user bases or where phishing attacks are common. The medium CVSS score reflects moderate risk; however, organizations with high-value data or regulatory obligations (e.g., GDPR compliance) should treat this vulnerability seriously to avoid data breaches and reputational damage.
Mitigation Recommendations
1. Immediate mitigation should focus on applying the vendor’s patch once available; monitor Intrexx’s official channels for updates. 2. In the interim, implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the portal’s web context. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting Velocity-Scripts. 4. Conduct user awareness training to reduce the risk of phishing or social engineering attacks that could deliver malicious payloads exploiting this XSS. 5. Review and sanitize all user inputs and outputs in custom scripts or portal extensions to ensure proper encoding and neutralization of HTML special characters. 6. Limit portal user privileges to the minimum necessary to reduce the impact of compromised accounts. 7. Monitor portal logs for unusual activity indicative of exploitation attempts, such as anomalous URL parameters or repeated script injection patterns.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-05-02T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbec148
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 6/26/2025, 12:15:36 AM
Last updated: 8/11/2025, 12:21:20 PM
Views: 16
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.