Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57244: n/a

0
Medium
VulnerabilityCVE-2025-57244cvecve-2025-57244
Published: Wed Nov 05 2025 (11/05/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OpenKM Community Edition 6.3.12 is vulnerable to stored cross-site scripting (XSS) in the user account creation interface. The Name field accepts script tags and the Email field is vulnerable when the POST request is modified to include encoded script tags, by passing frontend validation.

AI-Powered Analysis

AILast updated: 11/12/2025, 17:15:03 UTC

Technical Analysis

CVE-2025-57244 is a stored cross-site scripting (XSS) vulnerability identified in OpenKM Community Edition version 6.3.12, a widely used open-source document management system. The vulnerability arises from insufficient input sanitization in the user account creation interface. Specifically, the Name field allows direct insertion of script tags, while the Email field can be exploited by sending a modified POST request containing encoded script tags, which bypass frontend validation controls. This flaw enables an attacker with at least low privileges (PR:L) to inject malicious JavaScript code that is stored on the server and executed in the browsers of other users who view the affected pages, leading to potential session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability requires user interaction (UI:R) and has a scope change (S:C), meaning the attack can affect resources beyond the vulnerable component. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reflects that the attack can be performed remotely over the network with low attack complexity, requires some privileges and user interaction, and impacts confidentiality and integrity but not availability. No official patches or exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of sensitive information managed within OpenKM. Since OpenKM is used for document and content management, exploitation could lead to unauthorized access to confidential documents, theft of user credentials, or manipulation of user sessions. This could result in data breaches, compliance violations (e.g., GDPR), and reputational damage. The requirement for user interaction and low privileges reduces the likelihood of widespread automated exploitation, but targeted attacks against high-value users or administrators remain a concern. The absence of availability impact means service disruption is unlikely, but the integrity and confidentiality risks are significant enough to warrant immediate attention. Organizations relying on OpenKM for critical document workflows should consider this vulnerability a priority for remediation to maintain secure operations.

Mitigation Recommendations

To mitigate CVE-2025-57244, organizations should implement the following specific measures: 1) Immediately review and restrict user privileges to minimize the number of users who can create accounts or input data into vulnerable fields. 2) Apply strict server-side input validation and sanitization on all user-supplied data, especially in the Name and Email fields, to neutralize script tags and encoded payloads. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 4) Monitor logs for suspicious POST requests with encoded or unusual payloads targeting the account creation interface. 5) Educate users to be cautious of unexpected prompts or links that could trigger malicious scripts. 6) If possible, upgrade to a patched version of OpenKM once available or apply community-provided patches or workarounds. 7) Conduct regular security assessments and penetration tests focusing on web input validation and XSS vulnerabilities. These steps go beyond generic advice by emphasizing server-side controls, privilege management, and proactive monitoring tailored to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690b8077ffac907e5bea79c0

Added to database: 11/5/2025, 4:51:03 PM

Last enriched: 11/12/2025, 5:15:03 PM

Last updated: 12/20/2025, 12:56:59 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats