CVE-2025-47665: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bistromatic N360 | Splash Screen
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bistromatic N360 | Splash Screen allows Stored XSS. This issue affects N360 | Splash Screen: from n/a through 1.0.6.
AI Analysis
Technical Summary
CVE-2025-47665 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the bistromatic N360 | Splash Screen product up to version 1.0.6. The vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing malicious scripts to be stored and later executed in the context of the affected web application. Stored XSS differs from reflected XSS in that the malicious payload is persistently stored on the server, for example in databases or logs, and served to users without proper sanitization. This can lead to persistent compromise of user sessions, theft of sensitive information such as cookies or credentials, and potential execution of unauthorized actions on behalf of the victim. The CVSS 3.1 vector indicates that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact metrics show low confidentiality, integrity, and availability impacts (C:L/I:L/A:L), consistent with typical Stored XSS effects. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 7, 2025, and is enriched by CISA, indicating recognition by US cybersecurity authorities. The affected product, bistromatic N360 | Splash Screen, is a web-based component likely used to display splash or introductory screens in web applications or services. The vulnerability could be exploited by an authenticated attacker with high privileges who can inject malicious scripts that will be executed when other users access the splash screen, potentially leading to session hijacking, defacement, or further exploitation of the affected environment.
Potential Impact
For European organizations using bistromatic N360 | Splash Screen, this vulnerability poses a risk primarily to web application security and user trust. Stored XSS can lead to unauthorized access to user sessions, data leakage, and manipulation of web content, which can undermine confidentiality and integrity of user data. In sectors such as finance, healthcare, and government, where sensitive personal and operational data is handled, exploitation could lead to regulatory non-compliance with GDPR and other data protection laws, resulting in legal and financial penalties. Additionally, the requirement for high privileges to exploit the vulnerability suggests that insider threats or compromised administrative accounts could be leveraged to inject malicious scripts. This elevates the risk in environments where privilege management and access controls are weak. The scope change in the CVSS vector indicates that the impact could extend beyond the immediate application, potentially affecting other integrated systems or services. Although no active exploits are known, the presence of this vulnerability could be leveraged in targeted attacks or combined with other vulnerabilities for more severe consequences. The medium severity rating reflects a moderate risk level, but the potential for reputational damage and operational disruption should not be underestimated.
Mitigation Recommendations
To mitigate CVE-2025-47665, European organizations should implement the following specific measures: 1) Immediately review and restrict administrative and high-privilege user access to the bistromatic N360 | Splash Screen component to minimize the risk of malicious input injection. 2) Apply strict input validation and output encoding on all user-supplied data that is rendered on the splash screen, using context-appropriate encoding (e.g., HTML entity encoding) to neutralize scripts. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of any injected payloads. 4) Monitor logs and user activity for unusual behavior indicative of attempted or successful XSS exploitation, focusing on high-privilege accounts. 5) Engage with the vendor or software maintainers to obtain patches or updates addressing this vulnerability as soon as they become available. 6) Conduct regular security assessments and penetration testing focused on web application vulnerabilities, including stored XSS, to proactively identify and remediate weaknesses. 7) Educate privileged users about the risks of XSS and safe handling of input fields to prevent inadvertent injection. These targeted actions go beyond generic advice by focusing on privilege management, input/output handling specific to the splash screen context, and proactive monitoring.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-47665: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bistromatic N360 | Splash Screen
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bistromatic N360 | Splash Screen allows Stored XSS. This issue affects N360 | Splash Screen: from n/a through 1.0.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-47665 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the bistromatic N360 | Splash Screen product up to version 1.0.6. The vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing malicious scripts to be stored and later executed in the context of the affected web application. Stored XSS differs from reflected XSS in that the malicious payload is persistently stored on the server, for example in databases or logs, and served to users without proper sanitization. This can lead to persistent compromise of user sessions, theft of sensitive information such as cookies or credentials, and potential execution of unauthorized actions on behalf of the victim. The CVSS 3.1 vector indicates that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact metrics show low confidentiality, integrity, and availability impacts (C:L/I:L/A:L), consistent with typical Stored XSS effects. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 7, 2025, and is enriched by CISA, indicating recognition by US cybersecurity authorities. The affected product, bistromatic N360 | Splash Screen, is a web-based component likely used to display splash or introductory screens in web applications or services. The vulnerability could be exploited by an authenticated attacker with high privileges who can inject malicious scripts that will be executed when other users access the splash screen, potentially leading to session hijacking, defacement, or further exploitation of the affected environment.
Potential Impact
For European organizations using bistromatic N360 | Splash Screen, this vulnerability poses a risk primarily to web application security and user trust. Stored XSS can lead to unauthorized access to user sessions, data leakage, and manipulation of web content, which can undermine confidentiality and integrity of user data. In sectors such as finance, healthcare, and government, where sensitive personal and operational data is handled, exploitation could lead to regulatory non-compliance with GDPR and other data protection laws, resulting in legal and financial penalties. Additionally, the requirement for high privileges to exploit the vulnerability suggests that insider threats or compromised administrative accounts could be leveraged to inject malicious scripts. This elevates the risk in environments where privilege management and access controls are weak. The scope change in the CVSS vector indicates that the impact could extend beyond the immediate application, potentially affecting other integrated systems or services. Although no active exploits are known, the presence of this vulnerability could be leveraged in targeted attacks or combined with other vulnerabilities for more severe consequences. The medium severity rating reflects a moderate risk level, but the potential for reputational damage and operational disruption should not be underestimated.
Mitigation Recommendations
To mitigate CVE-2025-47665, European organizations should implement the following specific measures: 1) Immediately review and restrict administrative and high-privilege user access to the bistromatic N360 | Splash Screen component to minimize the risk of malicious input injection. 2) Apply strict input validation and output encoding on all user-supplied data that is rendered on the splash screen, using context-appropriate encoding (e.g., HTML entity encoding) to neutralize scripts. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of any injected payloads. 4) Monitor logs and user activity for unusual behavior indicative of attempted or successful XSS exploitation, focusing on high-privilege accounts. 5) Engage with the vendor or software maintainers to obtain patches or updates addressing this vulnerability as soon as they become available. 6) Conduct regular security assessments and penetration testing focused on web application vulnerabilities, including stored XSS, to proactively identify and remediate weaknesses. 7) Educate privileged users about the risks of XSS and safe handling of input fields to prevent inadvertent injection. These targeted actions go beyond generic advice by focusing on privilege management, input/output handling specific to the splash screen context, and proactive monitoring.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T10:45:20.229Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd934a
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 11:55:51 AM
Last updated: 7/30/2025, 7:54:03 PM
Views: 9
Related Threats
CVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.