Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55062: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Priority Web

0
Medium
VulnerabilityCVE-2025-55062cvecve-2025-55062cwe-79
Published: Mon Dec 29 2025 (12/29/2025, 17:18:00 UTC)
Source: CVE Database V5
Vendor/Project: Priority
Product: Web

Description

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

AI-Powered Analysis

AILast updated: 12/30/2025, 23:21:27 UTC

Technical Analysis

CVE-2025-55062 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Priority Web versions 23.0 and below. The flaw arises from improper neutralization of user-supplied input during web page generation, which can allow an attacker to inject malicious scripts into web pages viewed by other users. The CVSS 3.1 score of 4.8 (medium severity) reflects that the attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), indicating the vulnerability can affect resources beyond the vulnerable component. Successful exploitation could lead to limited confidentiality and integrity impacts, such as theft of session tokens, user credentials, or manipulation of displayed data. Availability is not impacted. No public exploits are known at this time. The vulnerability is significant in environments where Priority Web is used for sensitive business processes, especially if users with high privileges are targeted. The lack of current patches requires organizations to implement compensating controls until vendor fixes are released.

Potential Impact

For European organizations, exploitation of this XSS vulnerability could lead to unauthorized disclosure of sensitive information, including session cookies or personal data, potentially violating GDPR requirements. Integrity of displayed information could be compromised, misleading users or enabling phishing attacks within the trusted application context. Although availability is unaffected, the breach of confidentiality and integrity could disrupt business operations and damage reputation. Sectors such as finance, healthcare, and government using Priority Web are particularly vulnerable due to the sensitivity of their data and regulatory scrutiny. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate risk, especially in environments with insufficient privilege management or user awareness. Attackers could leverage this vulnerability as a foothold for further attacks or lateral movement within networks.

Mitigation Recommendations

Organizations should prioritize applying official patches from Priority once available. Until then, implement strict input validation and output encoding on all user-supplied data in Priority Web interfaces to prevent script injection. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts. Limit high privilege user accounts and enforce the principle of least privilege to reduce attack surface. Conduct user training to recognize and avoid phishing attempts that could trigger the vulnerability. Monitor web application logs for suspicious activity indicative of XSS attempts. Consider deploying Web Application Firewalls (WAFs) with rules targeting XSS patterns specific to Priority Web. Regularly review and update security configurations and perform penetration testing focused on XSS vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCD
Date Reserved
2025-08-06T11:06:54.841Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450b5db813ff03e2bf267

Added to database: 12/30/2025, 10:22:45 PM

Last enriched: 12/30/2025, 11:21:27 PM

Last updated: 2/6/2026, 3:08:51 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats