Skip to main content

CVE-2025-48143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in salesup2019 Formulario de contacto SalesUp!

High
VulnerabilityCVE-2025-48143cvecve-2025-48143cwe-79
Published: Mon Jun 09 2025 (06/09/2025, 15:53:57 UTC)
Source: CVE Database V5
Vendor/Project: salesup2019
Product: Formulario de contacto SalesUp!

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in salesup2019 Formulario de contacto SalesUp! allows Reflected XSS. This issue affects Formulario de contacto SalesUp!: from n/a through 1.0.14.

AI-Powered Analysis

AILast updated: 07/11/2025, 01:18:16 UTC

Technical Analysis

CVE-2025-48143 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the 'Formulario de contacto SalesUp!' component of the salesup2019 product. This vulnerability arises due to improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the flaw allows malicious actors to inject and execute arbitrary scripts in the context of a victim's browser when they interact with the vulnerable contact form. The vulnerability affects versions up to 1.0.14, though exact affected versions are not fully enumerated. The CVSS v3.1 score of 7.1 reflects a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact includes partial confidentiality, integrity, and availability loss (C:L/I:L/A:L). Reflected XSS can be leveraged for session hijacking, phishing, defacement, or delivering further malware payloads. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 9, 2025, with the initial reservation on May 15, 2025. The vulnerability is particularly relevant for web applications using the salesup2019 contact form module, which is likely integrated into customer-facing websites for communication purposes.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on the salesup2019 Formulario de contacto SalesUp! for customer interactions. Exploitation could lead to unauthorized script execution in users' browsers, enabling attackers to steal sensitive information such as session cookies, perform actions on behalf of users, or redirect users to malicious sites. This can damage organizational reputation, lead to data breaches involving personal data protected under GDPR, and cause service disruptions. Given the scope change in the CVSS vector, the impact could extend beyond the immediate application, potentially affecting other integrated systems or user accounts. Organizations in sectors with high customer interaction like e-commerce, finance, and public services are particularly vulnerable. The requirement for user interaction means phishing or social engineering could be used to lure victims, increasing the attack surface. Although no active exploits are reported, the high severity and ease of exploitation (no privileges needed) make timely mitigation critical to prevent potential attacks.

Mitigation Recommendations

Organizations should immediately audit their web applications to identify usage of the salesup2019 Formulario de contacto SalesUp! component. Until an official patch is released, implement strict input validation and output encoding on all user-supplied data in the contact form to neutralize script injection attempts. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of potential XSS payloads. Use web application firewalls (WAFs) with updated rules to detect and block reflected XSS attack patterns targeting the vulnerable endpoints. Educate users and administrators about phishing risks related to this vulnerability. Monitor web traffic for unusual patterns indicative of exploitation attempts. Once a vendor patch is available, prioritize its deployment. Additionally, conduct regular security testing, including automated scanning and manual penetration testing focused on XSS vectors in the affected components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T18:01:53.422Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f571b0bd07c3938a68d

Added to database: 6/10/2025, 6:54:15 PM

Last enriched: 7/11/2025, 1:18:16 AM

Last updated: 7/30/2025, 4:14:49 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats