Skip to main content

CVE-2025-58823: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in The African Boss Get Cash

Medium
VulnerabilityCVE-2025-58823cvecve-2025-58823cwe-79
Published: Fri Sep 05 2025 (09/05/2025, 13:45:20 UTC)
Source: CVE Database V5
Vendor/Project: The African Boss
Product: Get Cash

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The African Boss Get Cash allows Stored XSS. This issue affects Get Cash: from n/a through 3.2.2.

AI-Powered Analysis

AILast updated: 09/05/2025, 14:16:00 UTC

Technical Analysis

CVE-2025-58823 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the product "Get Cash" developed by The African Boss. This vulnerability arises from improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of users' browsers when they access affected pages. The vulnerability affects versions up to 3.2.2, with no specific version exclusions noted. The CVSS 3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L. This means the attack can be launched remotely over the network with low attack complexity, requires low privileges and user interaction, and impacts confidentiality, integrity, and availability to a limited extent. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and can affect multiple users, potentially leading to session hijacking, credential theft, defacement, or distribution of malware. The vulnerability's scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. Although no known exploits are reported in the wild yet, the presence of this vulnerability in a financial-related application like Get Cash raises concerns about potential phishing, fraud, or unauthorized transactions if exploited. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability requires some level of user interaction (UI:R), such as a user visiting a maliciously crafted page or content, and low privileges (PR:L), meaning an attacker with limited access could exploit it remotely.

Potential Impact

For European organizations, especially those involved in financial services, fintech, or using the Get Cash application, this vulnerability poses a risk of compromising user sessions and sensitive financial data. Exploitation could lead to unauthorized access to user accounts, fraudulent transactions, and reputational damage. The cross-site scripting flaw could also be leveraged to deliver malware or conduct phishing attacks targeting European users, potentially violating GDPR requirements related to data protection and breach notification. The impact on confidentiality, integrity, and availability, while limited, is significant in the context of financial applications where trust and data security are paramount. Organizations relying on Get Cash may face regulatory scrutiny and financial losses if this vulnerability is exploited. Additionally, the persistence of the stored XSS payload increases the risk of widespread impact across multiple users within an organization or customer base.

Mitigation Recommendations

1. Immediate mitigation should include implementing strict input validation and output encoding on all user-supplied data before rendering it in web pages, especially in areas where user input is stored and displayed. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 3. Conduct a thorough code review and security audit of the Get Cash application focusing on input handling and sanitization mechanisms. 4. Monitor web application logs for unusual input patterns or repeated attempts to inject scripts. 5. Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the application. 6. Engage with the vendor (The African Boss) to obtain patches or updates addressing this vulnerability as soon as they become available. 7. Implement web application firewalls (WAF) with rules tailored to detect and block XSS payloads targeting the Get Cash application. 8. For organizations unable to immediately patch, consider isolating the application environment and limiting user privileges to reduce exploitation risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:49:34.050Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68baeaa357c5b37b67a46075

Added to database: 9/5/2025, 1:50:27 PM

Last enriched: 9/5/2025, 2:16:00 PM

Last updated: 9/5/2025, 8:04:46 PM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats