CVE-2025-51662: n/a
A stored cross-site scripting (XSS) vulnerability is found in the text sharing feature of FileCodeBox version 2.2 and earlier. Insufficient input validation allows attackers to inject arbitrary JavaScript code into shared text "codeboxes". The xss payload is automatically executed in the browsers of any users who try to access the infected codebox by clicking link or entering share code.
AI Analysis
Technical Summary
CVE-2025-51662 is a stored cross-site scripting (XSS) vulnerability identified in FileCodeBox version 2.2 and earlier. The vulnerability stems from insufficient input validation in the text sharing feature, which allows attackers to inject arbitrary JavaScript payloads into shared 'codeboxes'. When a user accesses a compromised codebox by clicking a shared link or entering a share code, the malicious script executes automatically within their browser context. This execution can lead to unauthorized actions such as session hijacking, credential theft, or manipulation of displayed content, impacting confidentiality and integrity. The vulnerability requires low attacker privileges (PR:L) and user interaction (UI:R) but no physical or local access, as it is exploitable remotely over the network (AV:N). The CVSS v3.1 base score is 5.4, indicating medium severity, with a scope change (S:C) meaning the vulnerability affects resources beyond the initially vulnerable component. No public exploits have been reported to date, but the risk remains significant for users of vulnerable versions. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common and well-understood class of web application security issues. The lack of available patches at the time of publication necessitates immediate mitigation efforts by affected organizations.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data. Attackers exploiting this XSS flaw can execute arbitrary scripts in the context of authenticated users, potentially stealing session cookies, redirecting users to malicious sites, or manipulating shared content. This can lead to unauthorized access to sensitive information or disruption of collaboration workflows. Organizations relying on FileCodeBox for code sharing or collaborative editing are particularly vulnerable. The impact is heightened in sectors with strict data protection requirements, such as finance, healthcare, and government, where leakage of sensitive data could result in regulatory penalties and reputational damage. Although availability is not directly impacted, the indirect effects of compromised user trust and potential data breaches can be significant. The medium severity score reflects the need for timely remediation but indicates that exploitation requires user interaction and some level of privilege, somewhat limiting the attack surface.
Mitigation Recommendations
1. Monitor FileCodeBox vendor communications closely and apply security patches immediately upon release to address this vulnerability. 2. Until patches are available, restrict or disable the text sharing feature or limit its use to trusted users only. 3. Implement strict input validation and sanitization on all user-supplied data within the application to prevent injection of malicious scripts. 4. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing the application. 5. Educate users on the risks of clicking untrusted links or entering share codes from unknown sources. 6. Conduct regular security assessments and penetration testing focused on web application vulnerabilities, including XSS. 7. Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting FileCodeBox endpoints. 8. Review and limit user privileges within FileCodeBox to minimize the impact of compromised accounts. 9. Log and monitor access to shared codeboxes for unusual activity that may indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-51662: n/a
Description
A stored cross-site scripting (XSS) vulnerability is found in the text sharing feature of FileCodeBox version 2.2 and earlier. Insufficient input validation allows attackers to inject arbitrary JavaScript code into shared text "codeboxes". The xss payload is automatically executed in the browsers of any users who try to access the infected codebox by clicking link or entering share code.
AI-Powered Analysis
Technical Analysis
CVE-2025-51662 is a stored cross-site scripting (XSS) vulnerability identified in FileCodeBox version 2.2 and earlier. The vulnerability stems from insufficient input validation in the text sharing feature, which allows attackers to inject arbitrary JavaScript payloads into shared 'codeboxes'. When a user accesses a compromised codebox by clicking a shared link or entering a share code, the malicious script executes automatically within their browser context. This execution can lead to unauthorized actions such as session hijacking, credential theft, or manipulation of displayed content, impacting confidentiality and integrity. The vulnerability requires low attacker privileges (PR:L) and user interaction (UI:R) but no physical or local access, as it is exploitable remotely over the network (AV:N). The CVSS v3.1 base score is 5.4, indicating medium severity, with a scope change (S:C) meaning the vulnerability affects resources beyond the initially vulnerable component. No public exploits have been reported to date, but the risk remains significant for users of vulnerable versions. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common and well-understood class of web application security issues. The lack of available patches at the time of publication necessitates immediate mitigation efforts by affected organizations.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data. Attackers exploiting this XSS flaw can execute arbitrary scripts in the context of authenticated users, potentially stealing session cookies, redirecting users to malicious sites, or manipulating shared content. This can lead to unauthorized access to sensitive information or disruption of collaboration workflows. Organizations relying on FileCodeBox for code sharing or collaborative editing are particularly vulnerable. The impact is heightened in sectors with strict data protection requirements, such as finance, healthcare, and government, where leakage of sensitive data could result in regulatory penalties and reputational damage. Although availability is not directly impacted, the indirect effects of compromised user trust and potential data breaches can be significant. The medium severity score reflects the need for timely remediation but indicates that exploitation requires user interaction and some level of privilege, somewhat limiting the attack surface.
Mitigation Recommendations
1. Monitor FileCodeBox vendor communications closely and apply security patches immediately upon release to address this vulnerability. 2. Until patches are available, restrict or disable the text sharing feature or limit its use to trusted users only. 3. Implement strict input validation and sanitization on all user-supplied data within the application to prevent injection of malicious scripts. 4. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing the application. 5. Educate users on the risks of clicking untrusted links or entering share codes from unknown sources. 6. Conduct regular security assessments and penetration testing focused on web application vulnerabilities, including XSS. 7. Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting FileCodeBox endpoints. 8. Review and limit user privileges within FileCodeBox to minimize the impact of compromised accounts. 9. Log and monitor access to shared codeboxes for unusual activity that may indicate exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691e248d4d0ffcb40bb08682
Added to database: 11/19/2025, 8:11:57 PM
Last enriched: 11/26/2025, 9:12:13 PM
Last updated: 1/7/2026, 4:16:56 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.