CVE-2025-57244: n/a
OpenKM Community Edition 6.3.12 is vulnerable to stored cross-site scripting (XSS) in the user account creation interface. The Name field accepts script tags and the Email field is vulnerable when the POST request is modified to include encoded script tags, by passing frontend validation.
AI Analysis
Technical Summary
CVE-2025-57244 is a stored cross-site scripting (XSS) vulnerability identified in OpenKM Community Edition version 6.3.12, a widely used open-source document management system. The vulnerability arises from insufficient input sanitization in the user account creation interface. Specifically, the Name field allows direct insertion of script tags, while the Email field can be exploited by sending a modified POST request containing encoded script tags, which bypass frontend validation controls. This flaw enables an attacker with at least low privileges (PR:L) to inject malicious JavaScript code that is stored on the server and executed in the browsers of other users who view the affected pages, leading to potential session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability requires user interaction (UI:R) and has a scope change (S:C), meaning the attack can affect resources beyond the vulnerable component. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reflects that the attack can be performed remotely over the network with low attack complexity, requires some privileges and user interaction, and impacts confidentiality and integrity but not availability. No official patches or exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of sensitive information managed within OpenKM. Since OpenKM is used for document and content management, exploitation could lead to unauthorized access to confidential documents, theft of user credentials, or manipulation of user sessions. This could result in data breaches, compliance violations (e.g., GDPR), and reputational damage. The requirement for user interaction and low privileges reduces the likelihood of widespread automated exploitation, but targeted attacks against high-value users or administrators remain a concern. The absence of availability impact means service disruption is unlikely, but the integrity and confidentiality risks are significant enough to warrant immediate attention. Organizations relying on OpenKM for critical document workflows should consider this vulnerability a priority for remediation to maintain secure operations.
Mitigation Recommendations
To mitigate CVE-2025-57244, organizations should implement the following specific measures: 1) Immediately review and restrict user privileges to minimize the number of users who can create accounts or input data into vulnerable fields. 2) Apply strict server-side input validation and sanitization on all user-supplied data, especially in the Name and Email fields, to neutralize script tags and encoded payloads. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 4) Monitor logs for suspicious POST requests with encoded or unusual payloads targeting the account creation interface. 5) Educate users to be cautious of unexpected prompts or links that could trigger malicious scripts. 6) If possible, upgrade to a patched version of OpenKM once available or apply community-provided patches or workarounds. 7) Conduct regular security assessments and penetration tests focusing on web input validation and XSS vulnerabilities. These steps go beyond generic advice by emphasizing server-side controls, privilege management, and proactive monitoring tailored to this vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2025-57244: n/a
Description
OpenKM Community Edition 6.3.12 is vulnerable to stored cross-site scripting (XSS) in the user account creation interface. The Name field accepts script tags and the Email field is vulnerable when the POST request is modified to include encoded script tags, by passing frontend validation.
AI-Powered Analysis
Technical Analysis
CVE-2025-57244 is a stored cross-site scripting (XSS) vulnerability identified in OpenKM Community Edition version 6.3.12, a widely used open-source document management system. The vulnerability arises from insufficient input sanitization in the user account creation interface. Specifically, the Name field allows direct insertion of script tags, while the Email field can be exploited by sending a modified POST request containing encoded script tags, which bypass frontend validation controls. This flaw enables an attacker with at least low privileges (PR:L) to inject malicious JavaScript code that is stored on the server and executed in the browsers of other users who view the affected pages, leading to potential session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability requires user interaction (UI:R) and has a scope change (S:C), meaning the attack can affect resources beyond the vulnerable component. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reflects that the attack can be performed remotely over the network with low attack complexity, requires some privileges and user interaction, and impacts confidentiality and integrity but not availability. No official patches or exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of sensitive information managed within OpenKM. Since OpenKM is used for document and content management, exploitation could lead to unauthorized access to confidential documents, theft of user credentials, or manipulation of user sessions. This could result in data breaches, compliance violations (e.g., GDPR), and reputational damage. The requirement for user interaction and low privileges reduces the likelihood of widespread automated exploitation, but targeted attacks against high-value users or administrators remain a concern. The absence of availability impact means service disruption is unlikely, but the integrity and confidentiality risks are significant enough to warrant immediate attention. Organizations relying on OpenKM for critical document workflows should consider this vulnerability a priority for remediation to maintain secure operations.
Mitigation Recommendations
To mitigate CVE-2025-57244, organizations should implement the following specific measures: 1) Immediately review and restrict user privileges to minimize the number of users who can create accounts or input data into vulnerable fields. 2) Apply strict server-side input validation and sanitization on all user-supplied data, especially in the Name and Email fields, to neutralize script tags and encoded payloads. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 4) Monitor logs for suspicious POST requests with encoded or unusual payloads targeting the account creation interface. 5) Educate users to be cautious of unexpected prompts or links that could trigger malicious scripts. 6) If possible, upgrade to a patched version of OpenKM once available or apply community-provided patches or workarounds. 7) Conduct regular security assessments and penetration tests focusing on web input validation and XSS vulnerabilities. These steps go beyond generic advice by emphasizing server-side controls, privilege management, and proactive monitoring tailored to this vulnerability's characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690b8077ffac907e5bea79c0
Added to database: 11/5/2025, 4:51:03 PM
Last enriched: 11/12/2025, 5:15:03 PM
Last updated: 12/20/2025, 12:56:59 PM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalCVE-2025-12820: CWE-862 Missing Authorization in Pure WC Variation Swatches
UnknownCVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.