Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48095: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Ays Pro Survey Maker

0
Medium
VulnerabilityCVE-2025-48095cvecve-2025-48095
Published: Wed Oct 22 2025 (10/22/2025, 14:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Ays Pro
Product: Survey Maker

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro Survey Maker survey-maker allows Stored XSS.This issue affects Survey Maker: from n/a through <= 5.1.8.8.

AI-Powered Analysis

AILast updated: 11/13/2025, 11:00:09 UTC

Technical Analysis

CVE-2025-48095 is a stored cross-site scripting (XSS) vulnerability affecting Ays Pro Survey Maker, a web-based survey creation platform. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored and later executed in the context of other users' browsers. This flaw affects all versions up to and including 5.1.8.8. Exploitation requires an attacker with high privileges (PR:H) to inject the malicious payload, and successful exploitation also requires user interaction (UI:R), such as a victim viewing a crafted survey page. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as indicated by the CVSS vector (C:L/I:L/A:L). Attackers could leverage this to steal session tokens, perform actions on behalf of users, or deface survey content. The vulnerability is classified as medium severity with a CVSS score of 5.9. No public exploits have been reported, and no patches are currently linked, indicating the need for vendor response. The vulnerability’s scope is changed (S:C), meaning exploitation could affect resources beyond the vulnerable component. The issue was reserved in May 2025 and published in October 2025, suggesting recent discovery. The lack of patches and known exploits means organizations must proactively implement mitigations and monitor for updates.

Potential Impact

For European organizations, the impact of CVE-2025-48095 depends on their use of Ays Pro Survey Maker. Organizations relying on this software for internal or external surveys, especially in sectors like education, research, public administration, or market research, could face risks of session hijacking, unauthorized actions, or data manipulation. The stored XSS could allow attackers to execute scripts in the context of authenticated users, potentially leading to credential theft or privilege escalation. Although the vulnerability requires high privileges to inject payloads, insider threats or compromised accounts could exploit it. The limited confidentiality, integrity, and availability impacts mean the threat is moderate but could be a stepping stone for more severe attacks. Disruption of survey data integrity or availability could affect decision-making processes. Additionally, reputational damage may arise if survey participants are targeted or if data is manipulated. The absence of known exploits reduces immediate risk but does not eliminate it, especially as attackers may develop exploits once patches are released or if the vulnerability is disclosed widely.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately restrict high-privilege user accounts to trusted personnel and enforce strong authentication to reduce the risk of malicious input injection. 2) Apply strict input validation and sanitization on all user-supplied data fields within the survey maker, particularly those that are stored and rendered in web pages. 3) Employ context-aware output encoding (e.g., HTML entity encoding) when rendering user inputs to prevent script execution. 4) Monitor and audit survey content changes for suspicious inputs or unexpected scripts. 5) If vendor patches become available, prioritize timely application of updates. 6) Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the survey maker. 7) Educate users about the risks of interacting with untrusted survey links or content. 8) Isolate the survey maker environment to limit potential lateral movement or data exposure in case of exploitation. 9) Implement Content Security Policy (CSP) headers to restrict script execution sources. 10) Regularly review and update privilege assignments to minimize the number of users with high-level access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T17:54:23.205Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8efe804677bbd79439742

Added to database: 10/22/2025, 2:53:28 PM

Last enriched: 11/13/2025, 11:00:09 AM

Last updated: 12/14/2025, 10:15:42 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats