CVE-2025-58174: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LDAPAccountManager lam
LDAP Account Manager (LAM) is a webfrontend for managing entries stored in an LDAP directory. LAM before 9.3 allows stored cross-site scripting in the Profile section via the profile name field, which renders untrusted input as HTML and executes a supplied script (for example a script element). An authenticated user with permission to create or edit a profile can insert a script payload into the profile name and have it executed when the profile data is viewed in a browser. This issue is fixed in version 9.3. No known workarounds are mentioned.
AI Analysis
Technical Summary
CVE-2025-58174 is a stored cross-site scripting (XSS) vulnerability affecting LDAP Account Manager (LAM) versions prior to 9.3. LAM is a web-based frontend used to manage LDAP directory entries. The vulnerability arises from improper neutralization of input during web page generation, specifically in the Profile section where the profile name field is rendered. An authenticated user with permissions to create or edit profiles can inject malicious script code into the profile name. This script is then executed in the browser context of any user viewing the profile data, leading to potential theft of session tokens, unauthorized actions, or other malicious activities typical of XSS attacks. The vulnerability is classified under CWE-79, indicating improper input sanitization. Exploitation requires authentication with profile editing rights and user interaction (viewing the profile), but no known exploits are currently reported in the wild. The CVSS v3.1 base score is 4.6 (medium severity), reflecting a network attack vector with low complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. The issue is resolved in LAM version 9.3, with no known workarounds available for earlier versions.
Potential Impact
For European organizations using LDAP Account Manager versions prior to 9.3, this vulnerability poses a moderate risk. Since LAM is often used in enterprise environments to manage user directories, exploitation could lead to unauthorized disclosure of sensitive information or session hijacking within internal administrative portals. This could facilitate further lateral movement or privilege escalation within the network. The requirement for authenticated access limits exposure to internal or trusted users, but insider threats or compromised accounts could exploit this vulnerability. Confidentiality and integrity of user data and administrative sessions are at risk, potentially impacting compliance with GDPR and other data protection regulations. The absence of availability impact reduces the risk of service disruption but does not diminish the threat to data security and trustworthiness of identity management processes.
Mitigation Recommendations
European organizations should prioritize upgrading LDAP Account Manager to version 9.3 or later, where this vulnerability is fixed. Until upgrade is possible, organizations should restrict profile editing permissions strictly to trusted administrators and monitor for unusual profile changes or script injections. Implementing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting LAM interfaces can provide temporary protection. Additionally, enforcing strong authentication and session management controls reduces the risk of compromised accounts being used to exploit this vulnerability. Security teams should conduct regular audits of LDAP profiles for suspicious content and educate administrators about the risks of injecting untrusted input. Finally, organizations should ensure that browsers accessing LAM interfaces have XSS protection enabled and consider Content Security Policy (CSP) headers to mitigate script execution risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-58174: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LDAPAccountManager lam
Description
LDAP Account Manager (LAM) is a webfrontend for managing entries stored in an LDAP directory. LAM before 9.3 allows stored cross-site scripting in the Profile section via the profile name field, which renders untrusted input as HTML and executes a supplied script (for example a script element). An authenticated user with permission to create or edit a profile can insert a script payload into the profile name and have it executed when the profile data is viewed in a browser. This issue is fixed in version 9.3. No known workarounds are mentioned.
AI-Powered Analysis
Technical Analysis
CVE-2025-58174 is a stored cross-site scripting (XSS) vulnerability affecting LDAP Account Manager (LAM) versions prior to 9.3. LAM is a web-based frontend used to manage LDAP directory entries. The vulnerability arises from improper neutralization of input during web page generation, specifically in the Profile section where the profile name field is rendered. An authenticated user with permissions to create or edit profiles can inject malicious script code into the profile name. This script is then executed in the browser context of any user viewing the profile data, leading to potential theft of session tokens, unauthorized actions, or other malicious activities typical of XSS attacks. The vulnerability is classified under CWE-79, indicating improper input sanitization. Exploitation requires authentication with profile editing rights and user interaction (viewing the profile), but no known exploits are currently reported in the wild. The CVSS v3.1 base score is 4.6 (medium severity), reflecting a network attack vector with low complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. The issue is resolved in LAM version 9.3, with no known workarounds available for earlier versions.
Potential Impact
For European organizations using LDAP Account Manager versions prior to 9.3, this vulnerability poses a moderate risk. Since LAM is often used in enterprise environments to manage user directories, exploitation could lead to unauthorized disclosure of sensitive information or session hijacking within internal administrative portals. This could facilitate further lateral movement or privilege escalation within the network. The requirement for authenticated access limits exposure to internal or trusted users, but insider threats or compromised accounts could exploit this vulnerability. Confidentiality and integrity of user data and administrative sessions are at risk, potentially impacting compliance with GDPR and other data protection regulations. The absence of availability impact reduces the risk of service disruption but does not diminish the threat to data security and trustworthiness of identity management processes.
Mitigation Recommendations
European organizations should prioritize upgrading LDAP Account Manager to version 9.3 or later, where this vulnerability is fixed. Until upgrade is possible, organizations should restrict profile editing permissions strictly to trusted administrators and monitor for unusual profile changes or script injections. Implementing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting LAM interfaces can provide temporary protection. Additionally, enforcing strong authentication and session management controls reduces the risk of compromised accounts being used to exploit this vulnerability. Security teams should conduct regular audits of LDAP profiles for suspicious content and educate administrators about the risks of injecting untrusted input. Finally, organizations should ensure that browsers accessing LAM interfaces have XSS protection enabled and consider Content Security Policy (CSP) headers to mitigate script execution risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-27T13:34:56.189Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c993298d6281de8b72eaf5
Added to database: 9/16/2025, 4:41:13 PM
Last enriched: 9/16/2025, 4:41:40 PM
Last updated: 10/29/2025, 5:00:41 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-60595: n/a
UnknownCVE-2025-12478: CWE-326 Inadequate Encryption Strength in Azure Access Technology BLU-IC2
CriticalCVE-2025-12477: CWE-306 Missing Authentication for Critical Function in Azure Access Technology BLU-IC2
CriticalCVE-2025-12476: CWE-306 Missing Authentication for Critical Function in Azure Access Technology BLU-IC2
CriticalCVE-2025-12148: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in floragunn Search Guard FLX
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.