Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52180: n/a

0
High
VulnerabilityCVE-2025-52180cvecve-2025-52180
Published: Thu Oct 30 2025 (10/30/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-52180 is a cross-site scripting (XSS) vulnerability affecting Zucchetti Ad Hoc Infinity version 4. 2 and earlier. It allows remote, unauthenticated attackers to inject arbitrary JavaScript code via the pHtmlSource parameter in the /ahi/jsp/gsfr_feditorHTML. jsp endpoint. Exploitation does not require authentication or user interaction, enabling attackers to execute malicious scripts in the context of the victim's browser. This can lead to session hijacking, credential theft, or further exploitation of the affected web application. No known exploits are currently reported in the wild, and no CVSS score has been assigned. European organizations using this software should prioritize patching or applying mitigations to prevent potential attacks. Countries with significant deployments of Zucchetti products, particularly Italy and neighboring EU states, are most at risk. Given the ease of exploitation and potential impact on confidentiality and integrity, the severity is assessed as high.

AI-Powered Analysis

AILast updated: 10/30/2025, 18:58:32 UTC

Technical Analysis

CVE-2025-52180 is a security vulnerability classified as a cross-site scripting (XSS) flaw in Zucchetti Ad Hoc Infinity, a business intelligence and reporting software suite widely used in enterprise environments. The vulnerability exists in the handling of the pHtmlSource parameter within the /ahi/jsp/gsfr_feditorHTML.jsp endpoint. Specifically, the application fails to properly sanitize or encode user-supplied input passed to this parameter, allowing attackers to inject arbitrary JavaScript code. Because the vulnerability is accessible remotely and does not require any form of authentication, an attacker can exploit it by crafting a malicious URL or HTTP request that includes the payload in the pHtmlSource parameter. When a victim accesses this crafted URL or interacts with the affected page, the injected script executes in their browser context. This can lead to a range of malicious outcomes including theft of session cookies, redirection to phishing sites, or execution of further attacks such as malware delivery. The vulnerability affects Zucchetti Ad Hoc Infinity version 4.2 and earlier, with no patch or fix currently documented in the provided information. Although no exploits have been observed in the wild yet, the nature of XSS vulnerabilities and the lack of authentication barriers make this a significant risk. The absence of a CVSS score requires an independent severity assessment based on the vulnerability's characteristics.

Potential Impact

For European organizations, the impact of CVE-2025-52180 can be substantial, especially for those relying on Zucchetti Ad Hoc Infinity for critical business intelligence and reporting functions. Successful exploitation could compromise the confidentiality of sensitive business data by enabling attackers to hijack user sessions or steal credentials. Integrity could also be affected if attackers manipulate displayed data or inject misleading information via the XSS payload. Availability impact is generally limited for XSS, but indirect effects such as reputational damage or loss of trust in the application could disrupt business operations. Since the vulnerability requires no authentication and can be triggered remotely, attackers can target a broad range of users including employees, partners, or customers accessing the application. This increases the attack surface and potential for widespread compromise. Additionally, the ability to execute arbitrary JavaScript can facilitate further attacks such as delivering malware or exploiting other browser vulnerabilities. Organizations in Europe with regulatory obligations around data protection (e.g., GDPR) may face compliance risks if user data is compromised through this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-52180, European organizations should first verify if they are running Zucchetti Ad Hoc Infinity version 4.2 or earlier. Immediate steps include restricting access to the affected endpoint (/ahi/jsp/gsfr_feditorHTML.jsp) via web application firewalls (WAFs) or network controls to block malicious payloads targeting the pHtmlSource parameter. Input validation and output encoding should be implemented or enhanced to sanitize user inputs, preventing script injection. If vendor patches or updates become available, organizations must prioritize timely deployment. In the absence of official patches, consider applying virtual patching through WAF rules that detect and block suspicious parameter values. User education is also important to recognize phishing attempts that might leverage this vulnerability. Monitoring web server logs for unusual requests targeting the vulnerable endpoint can help detect exploitation attempts early. Finally, organizations should review their incident response plans to handle potential XSS exploitation scenarios and ensure browser security settings (e.g., Content Security Policy) are configured to limit script execution from untrusted sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6903b13baebfcd5474914700

Added to database: 10/30/2025, 6:40:59 PM

Last enriched: 10/30/2025, 6:58:32 PM

Last updated: 10/30/2025, 9:06:13 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats