CVE-2025-48095: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Ays Pro Survey Maker
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro Survey Maker survey-maker allows Stored XSS.This issue affects Survey Maker: from n/a through <= 5.1.8.8.
AI Analysis
Technical Summary
CVE-2025-48095 is a stored cross-site scripting (XSS) vulnerability affecting Ays Pro Survey Maker, a web-based survey creation platform. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored and later executed in the context of other users' browsers. This flaw affects all versions up to and including 5.1.8.8. Exploitation requires an attacker with high privileges (PR:H) to inject the malicious payload, and successful exploitation also requires user interaction (UI:R), such as a victim viewing a crafted survey page. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as indicated by the CVSS vector (C:L/I:L/A:L). Attackers could leverage this to steal session tokens, perform actions on behalf of users, or deface survey content. The vulnerability is classified as medium severity with a CVSS score of 5.9. No public exploits have been reported, and no patches are currently linked, indicating the need for vendor response. The vulnerability’s scope is changed (S:C), meaning exploitation could affect resources beyond the vulnerable component. The issue was reserved in May 2025 and published in October 2025, suggesting recent discovery. The lack of patches and known exploits means organizations must proactively implement mitigations and monitor for updates.
Potential Impact
For European organizations, the impact of CVE-2025-48095 depends on their use of Ays Pro Survey Maker. Organizations relying on this software for internal or external surveys, especially in sectors like education, research, public administration, or market research, could face risks of session hijacking, unauthorized actions, or data manipulation. The stored XSS could allow attackers to execute scripts in the context of authenticated users, potentially leading to credential theft or privilege escalation. Although the vulnerability requires high privileges to inject payloads, insider threats or compromised accounts could exploit it. The limited confidentiality, integrity, and availability impacts mean the threat is moderate but could be a stepping stone for more severe attacks. Disruption of survey data integrity or availability could affect decision-making processes. Additionally, reputational damage may arise if survey participants are targeted or if data is manipulated. The absence of known exploits reduces immediate risk but does not eliminate it, especially as attackers may develop exploits once patches are released or if the vulnerability is disclosed widely.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately restrict high-privilege user accounts to trusted personnel and enforce strong authentication to reduce the risk of malicious input injection. 2) Apply strict input validation and sanitization on all user-supplied data fields within the survey maker, particularly those that are stored and rendered in web pages. 3) Employ context-aware output encoding (e.g., HTML entity encoding) when rendering user inputs to prevent script execution. 4) Monitor and audit survey content changes for suspicious inputs or unexpected scripts. 5) If vendor patches become available, prioritize timely application of updates. 6) Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the survey maker. 7) Educate users about the risks of interacting with untrusted survey links or content. 8) Isolate the survey maker environment to limit potential lateral movement or data exposure in case of exploitation. 9) Implement Content Security Policy (CSP) headers to restrict script execution sources. 10) Regularly review and update privilege assignments to minimize the number of users with high-level access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-48095: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Ays Pro Survey Maker
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro Survey Maker survey-maker allows Stored XSS.This issue affects Survey Maker: from n/a through <= 5.1.8.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-48095 is a stored cross-site scripting (XSS) vulnerability affecting Ays Pro Survey Maker, a web-based survey creation platform. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored and later executed in the context of other users' browsers. This flaw affects all versions up to and including 5.1.8.8. Exploitation requires an attacker with high privileges (PR:H) to inject the malicious payload, and successful exploitation also requires user interaction (UI:R), such as a victim viewing a crafted survey page. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as indicated by the CVSS vector (C:L/I:L/A:L). Attackers could leverage this to steal session tokens, perform actions on behalf of users, or deface survey content. The vulnerability is classified as medium severity with a CVSS score of 5.9. No public exploits have been reported, and no patches are currently linked, indicating the need for vendor response. The vulnerability’s scope is changed (S:C), meaning exploitation could affect resources beyond the vulnerable component. The issue was reserved in May 2025 and published in October 2025, suggesting recent discovery. The lack of patches and known exploits means organizations must proactively implement mitigations and monitor for updates.
Potential Impact
For European organizations, the impact of CVE-2025-48095 depends on their use of Ays Pro Survey Maker. Organizations relying on this software for internal or external surveys, especially in sectors like education, research, public administration, or market research, could face risks of session hijacking, unauthorized actions, or data manipulation. The stored XSS could allow attackers to execute scripts in the context of authenticated users, potentially leading to credential theft or privilege escalation. Although the vulnerability requires high privileges to inject payloads, insider threats or compromised accounts could exploit it. The limited confidentiality, integrity, and availability impacts mean the threat is moderate but could be a stepping stone for more severe attacks. Disruption of survey data integrity or availability could affect decision-making processes. Additionally, reputational damage may arise if survey participants are targeted or if data is manipulated. The absence of known exploits reduces immediate risk but does not eliminate it, especially as attackers may develop exploits once patches are released or if the vulnerability is disclosed widely.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately restrict high-privilege user accounts to trusted personnel and enforce strong authentication to reduce the risk of malicious input injection. 2) Apply strict input validation and sanitization on all user-supplied data fields within the survey maker, particularly those that are stored and rendered in web pages. 3) Employ context-aware output encoding (e.g., HTML entity encoding) when rendering user inputs to prevent script execution. 4) Monitor and audit survey content changes for suspicious inputs or unexpected scripts. 5) If vendor patches become available, prioritize timely application of updates. 6) Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the survey maker. 7) Educate users about the risks of interacting with untrusted survey links or content. 8) Isolate the survey maker environment to limit potential lateral movement or data exposure in case of exploitation. 9) Implement Content Security Policy (CSP) headers to restrict script execution sources. 10) Regularly review and update privilege assignments to minimize the number of users with high-level access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-15T17:54:23.205Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f8efe804677bbd79439742
Added to database: 10/22/2025, 2:53:28 PM
Last enriched: 11/13/2025, 11:00:09 AM
Last updated: 12/14/2025, 10:15:42 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14653: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14652: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14651: Use of Hard-coded Cryptographic Key in MartialBE one-hub
MediumCVE-2025-14650: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14649: SQL Injection in itsourcecode Online Cake Ordering System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.