CVE-2025-5713: Cross Site Scripting in SoluçõesCoop iSoluçõesWEB
A vulnerability was found in SoluçõesCoop iSoluçõesWEB up to 20250519 and classified as problematic. Affected by this issue is some unknown functionality of the file /fluxos-dashboard of the component Flow Handler. The manipulation of the argument Descrição da solicitação leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-5713 is a cross-site scripting (XSS) vulnerability identified in the SoluçõesCoop iSoluçõesWEB product, specifically affecting versions up to 20250519. The vulnerability resides in the Flow Handler component, within the /fluxos-dashboard file. The issue arises from improper sanitization or validation of the 'Descrição da solicitação' parameter, which allows an attacker to inject malicious scripts. Since the attack vector is remote and does not require authentication, an attacker can craft a specially crafted request to exploit this vulnerability. Successful exploitation can lead to the execution of arbitrary JavaScript in the context of the victim's browser session, potentially resulting in session hijacking, defacement, or redirection to malicious sites. The CVSS v4.0 base score is 5.1, indicating a medium severity level. The vulnerability does not impact confidentiality or availability directly but has a limited impact on integrity through script injection. User interaction is required (UI:P), meaning the victim must interact with the malicious payload for the attack to succeed. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation. No official patches or mitigation links are provided, but upgrading the affected component is recommended once available.
Potential Impact
For European organizations using SoluçõesCoop iSoluçõesWEB, this vulnerability poses a moderate risk. Since the product is likely used in cooperative or financial environments (given the vendor name), exploitation could lead to session hijacking or theft of sensitive data through browser-based attacks. This could undermine user trust, lead to unauthorized actions within the application, and potentially cause regulatory compliance issues under GDPR if personal data is compromised. The remote and unauthenticated nature of the vulnerability increases the attack surface, especially for web-facing instances. However, the requirement for user interaction limits automated mass exploitation. The impact on availability is negligible, but integrity and confidentiality could be compromised at a limited scale. Organizations with high web traffic or critical workflows relying on iSoluçõesWEB should prioritize remediation to avoid reputational damage and potential financial loss.
Mitigation Recommendations
1. Immediate mitigation should include implementing strict input validation and output encoding on the 'Descrição da solicitação' parameter to neutralize malicious scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Conduct thorough code reviews and penetration testing focused on XSS vectors within the Flow Handler component. 4. Monitor web application logs for suspicious input patterns targeting the vulnerable parameter. 5. Educate users about the risks of interacting with untrusted links or inputs within the application. 6. Coordinate with SoluçõesCoop to obtain and apply official patches or updates as soon as they become available. 7. If patching is delayed, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block exploit attempts targeting this vulnerability. 8. Regularly update and audit all web-facing components to reduce exposure to similar vulnerabilities.
Affected Countries
Portugal, Spain, France, Germany, Italy
CVE-2025-5713: Cross Site Scripting in SoluçõesCoop iSoluçõesWEB
Description
A vulnerability was found in SoluçõesCoop iSoluçõesWEB up to 20250519 and classified as problematic. Affected by this issue is some unknown functionality of the file /fluxos-dashboard of the component Flow Handler. The manipulation of the argument Descrição da solicitação leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-5713 is a cross-site scripting (XSS) vulnerability identified in the SoluçõesCoop iSoluçõesWEB product, specifically affecting versions up to 20250519. The vulnerability resides in the Flow Handler component, within the /fluxos-dashboard file. The issue arises from improper sanitization or validation of the 'Descrição da solicitação' parameter, which allows an attacker to inject malicious scripts. Since the attack vector is remote and does not require authentication, an attacker can craft a specially crafted request to exploit this vulnerability. Successful exploitation can lead to the execution of arbitrary JavaScript in the context of the victim's browser session, potentially resulting in session hijacking, defacement, or redirection to malicious sites. The CVSS v4.0 base score is 5.1, indicating a medium severity level. The vulnerability does not impact confidentiality or availability directly but has a limited impact on integrity through script injection. User interaction is required (UI:P), meaning the victim must interact with the malicious payload for the attack to succeed. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation. No official patches or mitigation links are provided, but upgrading the affected component is recommended once available.
Potential Impact
For European organizations using SoluçõesCoop iSoluçõesWEB, this vulnerability poses a moderate risk. Since the product is likely used in cooperative or financial environments (given the vendor name), exploitation could lead to session hijacking or theft of sensitive data through browser-based attacks. This could undermine user trust, lead to unauthorized actions within the application, and potentially cause regulatory compliance issues under GDPR if personal data is compromised. The remote and unauthenticated nature of the vulnerability increases the attack surface, especially for web-facing instances. However, the requirement for user interaction limits automated mass exploitation. The impact on availability is negligible, but integrity and confidentiality could be compromised at a limited scale. Organizations with high web traffic or critical workflows relying on iSoluçõesWEB should prioritize remediation to avoid reputational damage and potential financial loss.
Mitigation Recommendations
1. Immediate mitigation should include implementing strict input validation and output encoding on the 'Descrição da solicitação' parameter to neutralize malicious scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Conduct thorough code reviews and penetration testing focused on XSS vectors within the Flow Handler component. 4. Monitor web application logs for suspicious input patterns targeting the vulnerable parameter. 5. Educate users about the risks of interacting with untrusted links or inputs within the application. 6. Coordinate with SoluçõesCoop to obtain and apply official patches or updates as soon as they become available. 7. If patching is delayed, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block exploit attempts targeting this vulnerability. 8. Regularly update and audit all web-facing components to reduce exposure to similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-05T04:53:04.348Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6842df031a426642debc963a
Added to database: 6/6/2025, 12:28:51 PM
Last enriched: 7/7/2025, 7:10:48 PM
Last updated: 1/7/2026, 4:21:33 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.