Skip to main content

CVE-2025-57145: n/a

Medium
VulnerabilityCVE-2025-57145cvecve-2025-57145
Published: Tue Sep 16 2025 (09/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A cross-site scripting (XSS) vulnerability exists in the search-autootaxi.php endpoint of the ATSMS web application. The application fails to properly sanitize user input submitted through a form field, allowing an attacker to inject arbitrary JavaScript code. The malicious payload is stored in the backend and executed when a user or administrator accesses the affected report page. This allows attackers to exfiltrate session cookies, hijack user sessions, and perform unauthorized actions in the context of the victims browser.

AI-Powered Analysis

AILast updated: 09/16/2025, 15:10:24 UTC

Technical Analysis

CVE-2025-57145 is a cross-site scripting (XSS) vulnerability identified in the ATSMS web application, specifically within the search-autootaxi.php endpoint. This vulnerability arises because the application does not properly sanitize user input submitted through a form field. As a result, an attacker can inject arbitrary JavaScript code that is stored persistently in the backend. When a user or administrator accesses the affected report page, the malicious script executes in their browser context. This persistent XSS attack vector enables attackers to exfiltrate sensitive information such as session cookies, hijack user sessions, and perform unauthorized actions on behalf of the victim within the application. The vulnerability is particularly dangerous because it leverages stored payloads, increasing the likelihood of exploitation by multiple users, including privileged administrators. Although no specific affected versions or patches have been disclosed, the vulnerability is publicly known as of September 16, 2025, and no known exploits are currently reported in the wild. The lack of a CVSS score requires an independent severity assessment based on the potential impact and exploitability factors.

Potential Impact

For European organizations using the ATSMS web application, this vulnerability poses significant risks. The ability to execute arbitrary JavaScript in the context of authenticated users can lead to session hijacking, unauthorized data access, and manipulation of application functionality. This could compromise the confidentiality and integrity of sensitive data managed by ATSMS, potentially including personal data protected under GDPR. The persistent nature of the XSS increases the attack surface, as multiple users may be exposed to the malicious payload. Organizations operating critical transportation or taxi management services that rely on ATSMS could face operational disruptions, reputational damage, and regulatory penalties if exploited. Furthermore, attackers could leverage this vulnerability as a foothold for broader network intrusion or lateral movement within an organization’s infrastructure.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and output encoding on all user-supplied data, especially within the search-autootaxi.php endpoint. Employing a robust web application firewall (WAF) configured to detect and block XSS payloads can provide an additional layer of defense. Regularly auditing and sanitizing stored data to remove malicious scripts is recommended. Since no patches are currently available, organizations should consider restricting access to the vulnerable endpoint to trusted users only and monitor logs for suspicious activity. Implementing Content Security Policy (CSP) headers can help limit the impact of injected scripts by restricting the sources from which scripts can be loaded. Finally, educating users and administrators about the risks of XSS and encouraging cautious behavior when interacting with reports can reduce exploitation likelihood.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c97dc81745d1bd2332d286

Added to database: 9/16/2025, 3:10:00 PM

Last enriched: 9/16/2025, 3:10:24 PM

Last updated: 9/19/2025, 3:30:00 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats