Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-51662: n/a

0
Unknown
VulnerabilityCVE-2025-51662cvecve-2025-51662
Published: Wed Nov 19 2025 (11/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored cross-site scripting (XSS) vulnerability is found in the text sharing feature of FileCodeBox version 2.2 and earlier. Insufficient input validation allows attackers to inject arbitrary JavaScript code into shared text "codeboxes". The xss payload is automatically executed in the browsers of any users who try to access the infected codebox by clicking link or entering share code.

AI-Powered Analysis

AILast updated: 11/19/2025, 20:12:40 UTC

Technical Analysis

CVE-2025-51662 is a stored cross-site scripting (XSS) vulnerability identified in FileCodeBox version 2.2 and earlier. The vulnerability stems from inadequate input validation in the text sharing feature, which allows attackers to embed arbitrary JavaScript payloads into shared 'codeboxes'. When a user accesses the compromised codebox by clicking a link or entering a share code, the malicious script executes automatically within their browser context. This execution can lead to a range of attacks including session hijacking, theft of sensitive information such as authentication tokens or cookies, and unauthorized actions performed with the victim's privileges. The vulnerability does not require authentication, increasing its risk profile, but does require user interaction to trigger the payload. No official CVSS score has been assigned yet, and there are no known exploits in the wild at this time. The lack of patch links suggests that a fix is either pending or not publicly disclosed. The vulnerability highlights the importance of robust input validation and output encoding in web applications that allow user-generated content, especially in collaborative environments like code sharing platforms.

Potential Impact

For European organizations, this vulnerability could lead to significant security breaches if exploited. Attackers could steal session cookies or credentials, enabling unauthorized access to internal systems or sensitive data. This is particularly concerning for organizations that use FileCodeBox for sharing proprietary or sensitive code snippets, as the injected scripts could facilitate lateral movement within networks or data exfiltration. The automatic execution of malicious scripts upon user interaction increases the risk of widespread compromise, especially in development teams or collaborative environments. Additionally, exploitation could damage organizational reputation and lead to compliance violations under regulations such as GDPR if personal data is compromised. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once the vulnerability becomes widely known.

Mitigation Recommendations

Organizations should proactively monitor for updates or patches from FileCodeBox and apply them promptly once available. In the interim, restricting or disabling the text sharing feature may reduce exposure. Implementing web application firewalls (WAFs) with rules to detect and block common XSS payloads can provide additional protection. Educate users to be cautious when clicking on shared codebox links or entering share codes from untrusted sources. Conduct regular security assessments and code reviews to identify similar input validation weaknesses. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources. Finally, consider isolating the FileCodeBox environment or limiting its network access to reduce the blast radius of any successful exploit.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691e248d4d0ffcb40bb08682

Added to database: 11/19/2025, 8:11:57 PM

Last enriched: 11/19/2025, 8:12:40 PM

Last updated: 11/19/2025, 10:02:39 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats