CVE-2025-47669: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Sabuj Kundu CBX Map for Google Map & OpenStreetMap
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sabuj Kundu CBX Map for Google Map & OpenStreetMap allows DOM-Based XSS. This issue affects CBX Map for Google Map & OpenStreetMap: from n/a through 1.1.12.
AI Analysis
Technical Summary
CVE-2025-47669 is a medium-severity vulnerability classified as CWE-79, indicating an improper neutralization of input during web page generation, commonly known as Cross-site Scripting (XSS). Specifically, this vulnerability affects the Sabuj Kundu CBX Map for Google Map & OpenStreetMap plugin, versions up to 1.1.12. The flaw allows for DOM-based XSS attacks, where malicious scripts can be injected and executed in the context of a victim's browser. This occurs because user-supplied input is not properly sanitized or encoded before being incorporated into the web page's DOM, enabling attackers to manipulate the client-side environment. The CVSS 3.1 base score is 6.5, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), scope changed (S:C), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). Although no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The affected product is a mapping plugin that integrates Google Maps and OpenStreetMap, likely used in web applications to display geographic data. The vulnerability's exploitation requires an attacker to lure a user with privileges to interact with a crafted link or page, triggering the malicious script execution in the victim's browser context, potentially leading to data leakage or manipulation of the web application interface.
Potential Impact
For European organizations, especially those relying on the CBX Map plugin for geographic data visualization on their websites or internal portals, this vulnerability could lead to significant security risks. Attackers exploiting this DOM-based XSS could steal session tokens, leading to unauthorized access to sensitive information or user accounts. This is particularly critical for organizations handling personal data under GDPR, as data breaches could result in regulatory penalties and reputational damage. Furthermore, the integrity of displayed geographic information could be compromised, misleading users or customers. Since the vulnerability requires user interaction and some level of privileges, targeted phishing campaigns could be used to exploit it, increasing the risk for employees or users with elevated access. The potential for availability impact, although lower, exists if attackers use the vulnerability to inject scripts that disrupt normal application functionality. Overall, the vulnerability could undermine trust in affected web services and expose organizations to compliance and operational risks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating the CBX Map plugin to a patched version once available from the vendor. In the absence of an official patch, organizations should implement strict input validation and output encoding on all user-supplied data before it is rendered in the DOM, especially data that interacts with the mapping plugin. Employing Content Security Policy (CSP) headers can help restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Additionally, organizations should conduct thorough security testing of web applications using the plugin to identify and remediate any exploitable input vectors. User awareness training to recognize phishing attempts can reduce the likelihood of successful exploitation requiring user interaction. Monitoring web application logs for unusual activity and implementing web application firewalls (WAF) with rules targeting XSS patterns can provide additional layers of defense. Finally, limiting user privileges and applying the principle of least privilege reduces the potential impact if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-47669: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Sabuj Kundu CBX Map for Google Map & OpenStreetMap
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sabuj Kundu CBX Map for Google Map & OpenStreetMap allows DOM-Based XSS. This issue affects CBX Map for Google Map & OpenStreetMap: from n/a through 1.1.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-47669 is a medium-severity vulnerability classified as CWE-79, indicating an improper neutralization of input during web page generation, commonly known as Cross-site Scripting (XSS). Specifically, this vulnerability affects the Sabuj Kundu CBX Map for Google Map & OpenStreetMap plugin, versions up to 1.1.12. The flaw allows for DOM-based XSS attacks, where malicious scripts can be injected and executed in the context of a victim's browser. This occurs because user-supplied input is not properly sanitized or encoded before being incorporated into the web page's DOM, enabling attackers to manipulate the client-side environment. The CVSS 3.1 base score is 6.5, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), scope changed (S:C), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). Although no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The affected product is a mapping plugin that integrates Google Maps and OpenStreetMap, likely used in web applications to display geographic data. The vulnerability's exploitation requires an attacker to lure a user with privileges to interact with a crafted link or page, triggering the malicious script execution in the victim's browser context, potentially leading to data leakage or manipulation of the web application interface.
Potential Impact
For European organizations, especially those relying on the CBX Map plugin for geographic data visualization on their websites or internal portals, this vulnerability could lead to significant security risks. Attackers exploiting this DOM-based XSS could steal session tokens, leading to unauthorized access to sensitive information or user accounts. This is particularly critical for organizations handling personal data under GDPR, as data breaches could result in regulatory penalties and reputational damage. Furthermore, the integrity of displayed geographic information could be compromised, misleading users or customers. Since the vulnerability requires user interaction and some level of privileges, targeted phishing campaigns could be used to exploit it, increasing the risk for employees or users with elevated access. The potential for availability impact, although lower, exists if attackers use the vulnerability to inject scripts that disrupt normal application functionality. Overall, the vulnerability could undermine trust in affected web services and expose organizations to compliance and operational risks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating the CBX Map plugin to a patched version once available from the vendor. In the absence of an official patch, organizations should implement strict input validation and output encoding on all user-supplied data before it is rendered in the DOM, especially data that interacts with the mapping plugin. Employing Content Security Policy (CSP) headers can help restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Additionally, organizations should conduct thorough security testing of web applications using the plugin to identify and remediate any exploitable input vectors. User awareness training to recognize phishing attempts can reduce the likelihood of successful exploitation requiring user interaction. Monitoring web application logs for unusual activity and implementing web application firewalls (WAF) with rules targeting XSS patterns can provide additional layers of defense. Finally, limiting user privileges and applying the principle of least privilege reduces the potential impact if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T10:45:27.458Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd9369
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 11:56:29 AM
Last updated: 8/12/2025, 7:59:08 PM
Views: 11
Related Threats
CVE-2025-27714: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumCVE-2025-24489: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumCVE-2025-55231: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2019
HighCVE-2025-55230: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809
HighCVE-2025-55229: CWE-347: Improper Verification of Cryptographic Signature in Microsoft Windows 10 Version 1809
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.