Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47977: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Nuance Digital Engagement Platform

0
High
VulnerabilityCVE-2025-47977cvecve-2025-47977cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 17:02:45 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Nuance Digital Engagement Platform

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Nuance Digital Engagement Platform allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:14:48 UTC

Technical Analysis

CVE-2025-47977 is a cross-site scripting (XSS) vulnerability identified in Microsoft Nuance Digital Engagement Platform version 1.0.0. The root cause is improper neutralization of input during web page generation, categorized under CWE-79. This flaw allows an attacker to inject malicious scripts into web pages viewed by other users, enabling spoofing attacks over the network. The vulnerability has a CVSS v3.1 base score of 8.2, indicating high severity. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but user interaction (UI:R) to execute. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact on confidentiality is high (C:H), integrity is low (I:L), and availability is none (A:N). Although no exploits are currently known in the wild, the potential for session hijacking, credential theft, or unauthorized actions through script injection is significant. The vulnerability affects only version 1.0.0 of the platform, which is used for digital customer engagement and communication workflows. Given the nature of XSS, attackers can craft malicious links or payloads that, when clicked by users, execute arbitrary scripts in their browsers, potentially compromising sensitive data or impersonating users. The lack of available patches at the time of publication necessitates immediate mitigation efforts by administrators.

Potential Impact

The vulnerability poses a substantial risk to organizations using the affected Nuance Digital Engagement Platform, particularly those handling sensitive customer data or relying on the platform for critical communication workflows. Exploitation could lead to unauthorized disclosure of confidential information, including personal data and session tokens, thereby compromising user accounts and privacy. Spoofing attacks enabled by this XSS flaw can facilitate phishing or social engineering campaigns, increasing the likelihood of broader compromise. The integrity impact is limited but could allow attackers to perform unauthorized actions on behalf of users. Since availability is unaffected, service disruption is unlikely. However, reputational damage and regulatory consequences from data breaches could be severe. The risk is amplified in environments with high user interaction and where the platform is integrated into customer-facing portals. Organizations worldwide that deploy this platform in sectors such as healthcare, finance, and customer service are particularly vulnerable to targeted exploitation attempts.

Mitigation Recommendations

Given the absence of an official patch at the time of disclosure, organizations should implement immediate compensating controls. These include input validation and output encoding on all user-supplied data within the platform to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Enable web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the Nuance platform. Educate users to recognize suspicious links and avoid interacting with untrusted content. Monitor logs for unusual activity indicative of XSS exploitation attempts. Segregate the Nuance platform from critical internal networks to limit lateral movement if compromised. Once available, promptly apply official patches or updates from Microsoft. Conduct thorough security assessments and penetration testing focused on web input handling in the platform. Maintain up-to-date backups and incident response plans to address potential breaches swiftly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:13:13.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f501b0bd07c3938995b

Added to database: 6/10/2025, 6:54:08 PM

Last enriched: 2/21/2026, 9:14:48 PM

Last updated: 3/28/2026, 3:51:03 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses