Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52179: n/a

0
Medium
VulnerabilityCVE-2025-52179cvecve-2025-52179
Published: Thu Oct 30 2025 (10/30/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross-site scripting (XSS) vulnerability in Zucchetti Ad Hoc Revolution 4.1 and earlier allows remote unauthenticated attackers to inject arbitrary JavaScript via the pHtmlSource parameter of the /ahrw/jsp/gsfr_feditorHTML.jsp endpoint.

AI-Powered Analysis

AILast updated: 11/08/2025, 02:11:01 UTC

Technical Analysis

CVE-2025-52179 is a cross-site scripting (XSS) vulnerability identified in Zucchetti Ad Hoc Revolution version 4.1 and earlier. The flaw exists in the handling of the pHtmlSource parameter within the /ahrw/jsp/gsfr_feditorHTML.jsp endpoint, where insufficient input sanitization allows remote attackers to inject arbitrary JavaScript code. This vulnerability is exploitable without authentication, meaning attackers do not need valid credentials to attempt exploitation. However, user interaction is required, typically involving a victim clicking a maliciously crafted URL or interacting with compromised content. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.1 (medium), reflecting the network attack vector, low attack complexity, no privileges required, requirement for user interaction, and impact limited to confidentiality and integrity with no availability impact. While no public exploits are currently known, the vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed in the context of the victim’s session. Zucchetti Ad Hoc Revolution is a business software suite primarily used in Italy and some other European countries, increasing the relevance of this vulnerability to European organizations. The vulnerability’s scope is limited to affected versions 4.1 and earlier, and no patches have been linked yet, indicating the need for vigilance and proactive mitigation.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information and manipulation of user sessions within the affected application. Attackers exploiting this XSS flaw could steal session cookies, perform actions on behalf of users, or deliver malicious payloads such as ransomware or spyware via injected scripts. Given Zucchetti’s strong market presence in Italy and usage in sectors such as finance, manufacturing, and public administration, the impact could be significant in these industries. The confidentiality and integrity of data processed by the application could be compromised, potentially leading to regulatory compliance issues under GDPR if personal data is exposed. Although availability is not directly impacted, the indirect consequences of successful exploitation—such as reputational damage and operational disruption—could be substantial. The requirement for user interaction somewhat limits the exploitability but does not eliminate risk, especially in environments where phishing or social engineering attacks are prevalent.

Mitigation Recommendations

1. Monitor Zucchetti’s official channels for patches addressing CVE-2025-52179 and apply them promptly once available. 2. Implement strict input validation and output encoding on the pHtmlSource parameter to neutralize malicious scripts. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4. Conduct regular security awareness training focused on phishing and social engineering to reduce the likelihood of users triggering the vulnerability. 5. Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting the vulnerable endpoint. 6. Review and limit the exposure of the /ahrw/jsp/gsfr_feditorHTML.jsp endpoint to only trusted networks or users where possible. 7. Perform regular security assessments and penetration testing to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6903adc2aebfcd54748fc6e1

Added to database: 10/30/2025, 6:26:10 PM

Last enriched: 11/8/2025, 2:11:01 AM

Last updated: 12/16/2025, 9:25:50 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats