Skip to main content

CVE-2025-47669: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Sabuj Kundu CBX Map for Google Map & OpenStreetMap

Medium
VulnerabilityCVE-2025-47669cvecve-2025-47669cwe-79
Published: Wed May 07 2025 (05/07/2025, 14:20:50 UTC)
Source: CVE
Vendor/Project: Sabuj Kundu
Product: CBX Map for Google Map & OpenStreetMap

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sabuj Kundu CBX Map for Google Map & OpenStreetMap allows DOM-Based XSS. This issue affects CBX Map for Google Map & OpenStreetMap: from n/a through 1.1.12.

AI-Powered Analysis

AILast updated: 07/05/2025, 11:56:29 UTC

Technical Analysis

CVE-2025-47669 is a medium-severity vulnerability classified as CWE-79, indicating an improper neutralization of input during web page generation, commonly known as Cross-site Scripting (XSS). Specifically, this vulnerability affects the Sabuj Kundu CBX Map for Google Map & OpenStreetMap plugin, versions up to 1.1.12. The flaw allows for DOM-based XSS attacks, where malicious scripts can be injected and executed in the context of a victim's browser. This occurs because user-supplied input is not properly sanitized or encoded before being incorporated into the web page's DOM, enabling attackers to manipulate the client-side environment. The CVSS 3.1 base score is 6.5, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), scope changed (S:C), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). Although no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The affected product is a mapping plugin that integrates Google Maps and OpenStreetMap, likely used in web applications to display geographic data. The vulnerability's exploitation requires an attacker to lure a user with privileges to interact with a crafted link or page, triggering the malicious script execution in the victim's browser context, potentially leading to data leakage or manipulation of the web application interface.

Potential Impact

For European organizations, especially those relying on the CBX Map plugin for geographic data visualization on their websites or internal portals, this vulnerability could lead to significant security risks. Attackers exploiting this DOM-based XSS could steal session tokens, leading to unauthorized access to sensitive information or user accounts. This is particularly critical for organizations handling personal data under GDPR, as data breaches could result in regulatory penalties and reputational damage. Furthermore, the integrity of displayed geographic information could be compromised, misleading users or customers. Since the vulnerability requires user interaction and some level of privileges, targeted phishing campaigns could be used to exploit it, increasing the risk for employees or users with elevated access. The potential for availability impact, although lower, exists if attackers use the vulnerability to inject scripts that disrupt normal application functionality. Overall, the vulnerability could undermine trust in affected web services and expose organizations to compliance and operational risks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating the CBX Map plugin to a patched version once available from the vendor. In the absence of an official patch, organizations should implement strict input validation and output encoding on all user-supplied data before it is rendered in the DOM, especially data that interacts with the mapping plugin. Employing Content Security Policy (CSP) headers can help restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Additionally, organizations should conduct thorough security testing of web applications using the plugin to identify and remediate any exploitable input vectors. User awareness training to recognize phishing attempts can reduce the likelihood of successful exploitation requiring user interaction. Monitoring web application logs for unusual activity and implementing web application firewalls (WAF) with rules targeting XSS patterns can provide additional layers of defense. Finally, limiting user privileges and applying the principle of least privilege reduces the potential impact if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T10:45:27.458Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd9369

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 11:56:29 AM

Last updated: 8/12/2025, 7:59:08 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats