CVE-2025-57929: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kanwei_doublethedonation Double the Donation
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kanwei_doublethedonation Double the Donation allows Stored XSS. This issue affects Double the Donation: from n/a through 2.0.0.
AI Analysis
Technical Summary
CVE-2025-57929 is a medium-severity stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the kanwei_doublethedonation product known as Double the Donation. This vulnerability arises from improper neutralization of input during web page generation, allowing malicious actors to inject and store malicious scripts within the application. When other users access the affected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS 3.1 base score of 5.9, indicating a moderate risk level. The vector string (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L) shows that exploitation requires network access, low attack complexity, high privileges, and user interaction, with a scope change and limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects versions up to 2.0.0, with no specific earliest affected version identified. Stored XSS vulnerabilities are particularly dangerous because they persist on the server and affect multiple users, increasing the attack surface and potential damage. Given the requirement of high privileges and user interaction, exploitation may be limited to authenticated users performing specific actions, but the scope change indicates that the vulnerability could affect other components or users beyond the initial context.
Potential Impact
For European organizations using Double the Donation, this vulnerability poses a risk of unauthorized script execution within their web applications, potentially compromising user sessions and data integrity. Nonprofits and fundraising platforms that rely on this software could see reputational damage and loss of donor trust if attackers exploit this flaw to steal sensitive information or manipulate donation data. The stored nature of the XSS means that once malicious code is injected, it can affect multiple users, increasing the risk of widespread impact. The requirement for high privileges to exploit limits the risk to some extent, but insider threats or compromised accounts could still leverage this vulnerability. Additionally, the scope change suggests that the vulnerability could lead to broader system compromise beyond the initial user context, which is concerning for organizations with interconnected systems. Given the medium severity and the lack of known exploits, the immediate risk is moderate, but organizations should act proactively to prevent potential exploitation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Conduct a thorough code review and input validation audit for all user-supplied data in the Double the Donation application, focusing on proper encoding and sanitization to neutralize malicious scripts. 2) Restrict high-privilege user roles and enforce the principle of least privilege to reduce the risk of exploitation by insiders or compromised accounts. 3) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 4) Monitor application logs and user activity for unusual behavior indicative of attempted XSS exploitation. 5) Apply web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting this product. 6) Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 7) Educate users with high privileges about the risks of clicking on suspicious links or performing unsafe actions within the application. 8) Consider isolating or sandboxing affected components to limit the scope of potential exploitation.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden
CVE-2025-57929: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kanwei_doublethedonation Double the Donation
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kanwei_doublethedonation Double the Donation allows Stored XSS. This issue affects Double the Donation: from n/a through 2.0.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-57929 is a medium-severity stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the kanwei_doublethedonation product known as Double the Donation. This vulnerability arises from improper neutralization of input during web page generation, allowing malicious actors to inject and store malicious scripts within the application. When other users access the affected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS 3.1 base score of 5.9, indicating a moderate risk level. The vector string (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L) shows that exploitation requires network access, low attack complexity, high privileges, and user interaction, with a scope change and limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects versions up to 2.0.0, with no specific earliest affected version identified. Stored XSS vulnerabilities are particularly dangerous because they persist on the server and affect multiple users, increasing the attack surface and potential damage. Given the requirement of high privileges and user interaction, exploitation may be limited to authenticated users performing specific actions, but the scope change indicates that the vulnerability could affect other components or users beyond the initial context.
Potential Impact
For European organizations using Double the Donation, this vulnerability poses a risk of unauthorized script execution within their web applications, potentially compromising user sessions and data integrity. Nonprofits and fundraising platforms that rely on this software could see reputational damage and loss of donor trust if attackers exploit this flaw to steal sensitive information or manipulate donation data. The stored nature of the XSS means that once malicious code is injected, it can affect multiple users, increasing the risk of widespread impact. The requirement for high privileges to exploit limits the risk to some extent, but insider threats or compromised accounts could still leverage this vulnerability. Additionally, the scope change suggests that the vulnerability could lead to broader system compromise beyond the initial user context, which is concerning for organizations with interconnected systems. Given the medium severity and the lack of known exploits, the immediate risk is moderate, but organizations should act proactively to prevent potential exploitation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Conduct a thorough code review and input validation audit for all user-supplied data in the Double the Donation application, focusing on proper encoding and sanitization to neutralize malicious scripts. 2) Restrict high-privilege user roles and enforce the principle of least privilege to reduce the risk of exploitation by insiders or compromised accounts. 3) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 4) Monitor application logs and user activity for unusual behavior indicative of attempted XSS exploitation. 5) Apply web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting this product. 6) Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 7) Educate users with high privileges about the risks of clicking on suspicious links or performing unsafe actions within the application. 8) Consider isolating or sandboxing affected components to limit the scope of potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-08-22T11:36:24.370Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d194c5a6a0abbafb7a3932
Added to database: 9/22/2025, 6:26:13 PM
Last enriched: 9/30/2025, 12:46:50 AM
Last updated: 10/7/2025, 1:41:10 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.