Skip to main content

CVE-2025-50035: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CyrilG Fyrebox Quizzes

Medium
VulnerabilityCVE-2025-50035cvecve-2025-50035cwe-79
Published: Fri Jun 20 2025 (06/20/2025, 15:03:53 UTC)
Source: CVE Database V5
Vendor/Project: CyrilG
Product: Fyrebox Quizzes

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CyrilG Fyrebox Quizzes allows Stored XSS. This issue affects Fyrebox Quizzes: from n/a through 3.0.

AI-Powered Analysis

AILast updated: 06/21/2025, 11:23:45 UTC

Technical Analysis

CVE-2025-50035 is a Stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 affecting CyrilG's Fyrebox Quizzes product, up to version 3.0. The vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing malicious scripts to be stored and later executed in the context of users accessing the affected quizzes. This Stored XSS flaw means that an attacker can inject malicious JavaScript code into quiz content or input fields, which is then persistently stored on the server and served to other users without adequate sanitization or encoding. When victims load the compromised quiz, the malicious script executes in their browsers, potentially leading to session hijacking, credential theft, unauthorized actions on behalf of the user, or distribution of malware. The CVSS 3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R), and a scope change (S:C). The impact affects confidentiality, integrity, and availability at a low level but can be escalated depending on the victim's privileges and the nature of the injected payload. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability requires an attacker to have some level of authenticated access to inject the malicious payload, and the victim must interact with the malicious content for exploitation to succeed. Stored XSS vulnerabilities are particularly dangerous in web applications that have a broad user base or handle sensitive information, as they can be used to compromise multiple users and propagate attacks within an organization or community.

Potential Impact

For European organizations using Fyrebox Quizzes, this vulnerability poses a risk of client-side compromise through malicious script execution. Potential impacts include theft of user credentials, session tokens, and personal data, which can lead to unauthorized access to internal systems or sensitive information. The integrity of quiz content and user data can be compromised, undermining trust in the platform. Availability could be affected if attackers use the vulnerability to inject disruptive scripts or malware. Educational institutions, corporate training departments, and marketing teams that rely on Fyrebox Quizzes for interactive content are particularly at risk, as exploitation could lead to data breaches or reputational damage. Given the requirement for some level of authentication and user interaction, the threat is more pronounced in environments where quizzes are shared internally or with trusted users. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other parts of the web application or user sessions. Although no active exploits are reported, the medium severity and stored nature of the XSS warrant proactive mitigation to prevent exploitation and lateral movement within affected organizations.

Mitigation Recommendations

1. Implement strict input validation and output encoding on all user-supplied data fields within Fyrebox Quizzes, ensuring that any HTML or script content is properly sanitized before storage and rendering. 2. Apply Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS payloads. 3. Enforce least privilege access controls to limit the ability of users to inject content, especially restricting quiz creation or editing rights to trusted personnel only. 4. Monitor and audit quiz content regularly for suspicious or unexpected script tags or encoded payloads that may indicate attempted exploitation. 5. Educate users about the risks of interacting with untrusted quiz content and encourage reporting of anomalous behavior. 6. Since no official patch is currently available, consider isolating or disabling vulnerable quiz functionalities until a vendor fix is released. 7. Employ web application firewalls (WAF) with rules tuned to detect and block common XSS attack patterns targeting the Fyrebox Quizzes application. 8. Review authentication mechanisms to ensure that privilege escalation is not possible, reducing the risk posed by the requirement of authenticated access for exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:08:41.943Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68568e85aded773421b5aae0

Added to database: 6/21/2025, 10:50:45 AM

Last enriched: 6/21/2025, 11:23:45 AM

Last updated: 8/3/2025, 12:34:15 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats