Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58174: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LDAPAccountManager lam

0
Medium
VulnerabilityCVE-2025-58174cvecve-2025-58174cwe-79
Published: Tue Sep 16 2025 (09/16/2025, 16:29:37 UTC)
Source: CVE Database V5
Vendor/Project: LDAPAccountManager
Product: lam

Description

LDAP Account Manager (LAM) is a webfrontend for managing entries stored in an LDAP directory. LAM before 9.3 allows stored cross-site scripting in the Profile section via the profile name field, which renders untrusted input as HTML and executes a supplied script (for example a script element). An authenticated user with permission to create or edit a profile can insert a script payload into the profile name and have it executed when the profile data is viewed in a browser. This issue is fixed in version 9.3. No known workarounds are mentioned.

AI-Powered Analysis

AILast updated: 09/16/2025, 16:41:40 UTC

Technical Analysis

CVE-2025-58174 is a stored cross-site scripting (XSS) vulnerability affecting LDAP Account Manager (LAM) versions prior to 9.3. LAM is a web-based frontend used to manage LDAP directory entries. The vulnerability arises from improper neutralization of input during web page generation, specifically in the Profile section where the profile name field is rendered. An authenticated user with permissions to create or edit profiles can inject malicious script code into the profile name. This script is then executed in the browser context of any user viewing the profile data, leading to potential theft of session tokens, unauthorized actions, or other malicious activities typical of XSS attacks. The vulnerability is classified under CWE-79, indicating improper input sanitization. Exploitation requires authentication with profile editing rights and user interaction (viewing the profile), but no known exploits are currently reported in the wild. The CVSS v3.1 base score is 4.6 (medium severity), reflecting a network attack vector with low complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. The issue is resolved in LAM version 9.3, with no known workarounds available for earlier versions.

Potential Impact

For European organizations using LDAP Account Manager versions prior to 9.3, this vulnerability poses a moderate risk. Since LAM is often used in enterprise environments to manage user directories, exploitation could lead to unauthorized disclosure of sensitive information or session hijacking within internal administrative portals. This could facilitate further lateral movement or privilege escalation within the network. The requirement for authenticated access limits exposure to internal or trusted users, but insider threats or compromised accounts could exploit this vulnerability. Confidentiality and integrity of user data and administrative sessions are at risk, potentially impacting compliance with GDPR and other data protection regulations. The absence of availability impact reduces the risk of service disruption but does not diminish the threat to data security and trustworthiness of identity management processes.

Mitigation Recommendations

European organizations should prioritize upgrading LDAP Account Manager to version 9.3 or later, where this vulnerability is fixed. Until upgrade is possible, organizations should restrict profile editing permissions strictly to trusted administrators and monitor for unusual profile changes or script injections. Implementing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting LAM interfaces can provide temporary protection. Additionally, enforcing strong authentication and session management controls reduces the risk of compromised accounts being used to exploit this vulnerability. Security teams should conduct regular audits of LDAP profiles for suspicious content and educate administrators about the risks of injecting untrusted input. Finally, organizations should ensure that browsers accessing LAM interfaces have XSS protection enabled and consider Content Security Policy (CSP) headers to mitigate script execution risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-27T13:34:56.189Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c993298d6281de8b72eaf5

Added to database: 9/16/2025, 4:41:13 PM

Last enriched: 9/16/2025, 4:41:40 PM

Last updated: 10/29/2025, 5:00:41 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats