CVE-2025-54806: Cross-site scripting (XSS) in GROWI, Inc. GROWI
GROWI v4.2.7 and earlier contains a cross-site scripting vulnerability in the page alert function. If a user accesses a crafted URL while logged in to the affected product, an arbitrary script may be executed on the user's web browser.
AI Analysis
Technical Summary
CVE-2025-54806 is a cross-site scripting vulnerability identified in GROWI, Inc.'s GROWI product, specifically affecting versions 4.2.7 and earlier. The vulnerability resides in the page alert function, which improperly sanitizes user input embedded in URLs. When a logged-in user accesses a specially crafted URL containing malicious JavaScript code, the script executes within the context of the user's browser session. This XSS flaw allows attackers to perform actions such as stealing session cookies, conducting unauthorized operations on behalf of the user, or redirecting users to malicious sites. The vulnerability requires user interaction, as the victim must click or navigate to the malicious URL while authenticated. The CVSS 3.0 base score is 6.1, reflecting medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but user interaction necessary. The scope is changed (S:C), indicating the vulnerability affects resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is unaffected. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on GROWI for collaborative documentation and knowledge management. The lack of a patch link suggests that remediation may require vendor updates or manual mitigations. Organizations should monitor for updates and consider temporary mitigations such as input filtering or URL sanitization.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive internal documentation and user impersonation within GROWI instances. As GROWI is often used for collaborative knowledge management, exploitation could result in leakage of confidential business information or manipulation of critical operational data. The attack requires a logged-in user to interact with a malicious URL, making phishing or social engineering likely attack vectors. The medium severity indicates moderate risk; however, in sectors with high confidentiality requirements such as finance, healthcare, or government, the impact could be more significant. Additionally, compromised user sessions could facilitate lateral movement or further exploitation within corporate networks. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure. Organizations with remote or hybrid workforces may be more exposed due to increased URL sharing and external communications.
Mitigation Recommendations
1. Upgrade GROWI to the latest version once a patch addressing CVE-2025-54806 is released by the vendor. 2. Until a patch is available, implement strict input validation and output encoding on the page alert function to sanitize URL parameters and prevent script injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the GROWI web application. 4. Educate users about the risks of clicking unsolicited or suspicious URLs, especially when logged into internal systems. 5. Monitor web server logs and user activity for unusual URL access patterns indicative of exploitation attempts. 6. Consider deploying web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting GROWI. 7. Review and limit the permissions of GROWI users to minimize potential damage from compromised accounts. 8. Regularly audit and update security configurations for internal collaboration tools to reduce attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-54806: Cross-site scripting (XSS) in GROWI, Inc. GROWI
Description
GROWI v4.2.7 and earlier contains a cross-site scripting vulnerability in the page alert function. If a user accesses a crafted URL while logged in to the affected product, an arbitrary script may be executed on the user's web browser.
AI-Powered Analysis
Technical Analysis
CVE-2025-54806 is a cross-site scripting vulnerability identified in GROWI, Inc.'s GROWI product, specifically affecting versions 4.2.7 and earlier. The vulnerability resides in the page alert function, which improperly sanitizes user input embedded in URLs. When a logged-in user accesses a specially crafted URL containing malicious JavaScript code, the script executes within the context of the user's browser session. This XSS flaw allows attackers to perform actions such as stealing session cookies, conducting unauthorized operations on behalf of the user, or redirecting users to malicious sites. The vulnerability requires user interaction, as the victim must click or navigate to the malicious URL while authenticated. The CVSS 3.0 base score is 6.1, reflecting medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but user interaction necessary. The scope is changed (S:C), indicating the vulnerability affects resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is unaffected. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on GROWI for collaborative documentation and knowledge management. The lack of a patch link suggests that remediation may require vendor updates or manual mitigations. Organizations should monitor for updates and consider temporary mitigations such as input filtering or URL sanitization.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive internal documentation and user impersonation within GROWI instances. As GROWI is often used for collaborative knowledge management, exploitation could result in leakage of confidential business information or manipulation of critical operational data. The attack requires a logged-in user to interact with a malicious URL, making phishing or social engineering likely attack vectors. The medium severity indicates moderate risk; however, in sectors with high confidentiality requirements such as finance, healthcare, or government, the impact could be more significant. Additionally, compromised user sessions could facilitate lateral movement or further exploitation within corporate networks. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure. Organizations with remote or hybrid workforces may be more exposed due to increased URL sharing and external communications.
Mitigation Recommendations
1. Upgrade GROWI to the latest version once a patch addressing CVE-2025-54806 is released by the vendor. 2. Until a patch is available, implement strict input validation and output encoding on the page alert function to sanitize URL parameters and prevent script injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the GROWI web application. 4. Educate users about the risks of clicking unsolicited or suspicious URLs, especially when logged into internal systems. 5. Monitor web server logs and user activity for unusual URL access patterns indicative of exploitation attempts. 6. Consider deploying web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting GROWI. 7. Review and limit the permissions of GROWI users to minimize potential damage from compromised accounts. 8. Regularly audit and update security configurations for internal collaboration tools to reduce attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-10-15T05:16:42.225Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68f9af5e102015466a3d33f9
Added to database: 10/23/2025, 4:30:22 AM
Last enriched: 10/30/2025, 4:39:57 AM
Last updated: 12/6/2025, 8:05:33 PM
Views: 222
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14141: Buffer Overflow in UTT 进取 520W
HighCVE-2025-14140: Buffer Overflow in UTT 进取 520W
HighCVE-2025-14139: Buffer Overflow in UTT 进取 520W
MediumCVE-2025-14136: Stack-based Buffer Overflow in Linksys RE6500
HighCVE-2025-14135: Stack-based Buffer Overflow in Linksys RE6500
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.