CVE-2025-58837: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Shiful H SS Font Awesome Icon
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Shiful H SS Font Awesome Icon allows Stored XSS. This issue affects SS Font Awesome Icon: from n/a through 4.1.3.
AI Analysis
Technical Summary
CVE-2025-58837 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the SS Font Awesome Icon component developed by Shiful H. This vulnerability arises from improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of users' browsers. Specifically, the flaw exists in versions up to 4.1.3 of the SS Font Awesome Icon product. Exploitation requires an attacker with at least some level of privileges (PR:L) and user interaction (UI:R), such as tricking a user into clicking a crafted link or viewing a malicious page. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L) reveals that the attack can be performed remotely over the network with low attack complexity, but requires privileges and user interaction. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes low confidentiality, integrity, and availability impacts, but the stored nature of the XSS can lead to persistent exploitation, potentially affecting multiple users. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. Stored XSS vulnerabilities can be leveraged to hijack user sessions, deface websites, or deliver malware, making them significant threats especially in web applications with many users or sensitive data.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to web applications or services that integrate the SS Font Awesome Icon component. If exploited, attackers could execute arbitrary JavaScript in the browsers of users, potentially leading to session hijacking, unauthorized actions on behalf of users, theft of sensitive data, or distribution of malware. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations if personal data is compromised), and cause operational disruptions. Given the medium severity and requirement for some privileges and user interaction, the threat is moderate but should not be underestimated, especially for organizations with public-facing web portals or internal tools accessible by multiple users. The persistent nature of stored XSS increases the risk of widespread impact once the malicious payload is stored and served to multiple users. European organizations in sectors such as finance, healthcare, government, and e-commerce, which rely heavily on secure web interfaces, are particularly at risk.
Mitigation Recommendations
Organizations should immediately inventory their web applications and services to identify any usage of the SS Font Awesome Icon component, especially versions up to 4.1.3. Since no official patches are currently available, temporary mitigations include implementing strict input validation and output encoding on all user-supplied data to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly audit and sanitize stored data that may contain malicious scripts. Limit user privileges to the minimum necessary to reduce the risk of exploitation. Monitor web application logs for unusual activity indicative of XSS attempts. Additionally, consider isolating or sandboxing components that render user-generated content. Stay updated with vendor advisories for patches or updates addressing this vulnerability and apply them promptly once released. Conduct security awareness training to reduce the risk of successful social engineering that could trigger user interaction requirements.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-58837: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Shiful H SS Font Awesome Icon
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Shiful H SS Font Awesome Icon allows Stored XSS. This issue affects SS Font Awesome Icon: from n/a through 4.1.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-58837 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the SS Font Awesome Icon component developed by Shiful H. This vulnerability arises from improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of users' browsers. Specifically, the flaw exists in versions up to 4.1.3 of the SS Font Awesome Icon product. Exploitation requires an attacker with at least some level of privileges (PR:L) and user interaction (UI:R), such as tricking a user into clicking a crafted link or viewing a malicious page. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L) reveals that the attack can be performed remotely over the network with low attack complexity, but requires privileges and user interaction. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes low confidentiality, integrity, and availability impacts, but the stored nature of the XSS can lead to persistent exploitation, potentially affecting multiple users. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. Stored XSS vulnerabilities can be leveraged to hijack user sessions, deface websites, or deliver malware, making them significant threats especially in web applications with many users or sensitive data.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to web applications or services that integrate the SS Font Awesome Icon component. If exploited, attackers could execute arbitrary JavaScript in the browsers of users, potentially leading to session hijacking, unauthorized actions on behalf of users, theft of sensitive data, or distribution of malware. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations if personal data is compromised), and cause operational disruptions. Given the medium severity and requirement for some privileges and user interaction, the threat is moderate but should not be underestimated, especially for organizations with public-facing web portals or internal tools accessible by multiple users. The persistent nature of stored XSS increases the risk of widespread impact once the malicious payload is stored and served to multiple users. European organizations in sectors such as finance, healthcare, government, and e-commerce, which rely heavily on secure web interfaces, are particularly at risk.
Mitigation Recommendations
Organizations should immediately inventory their web applications and services to identify any usage of the SS Font Awesome Icon component, especially versions up to 4.1.3. Since no official patches are currently available, temporary mitigations include implementing strict input validation and output encoding on all user-supplied data to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly audit and sanitize stored data that may contain malicious scripts. Limit user privileges to the minimum necessary to reduce the risk of exploitation. Monitor web application logs for unusual activity indicative of XSS attempts. Additionally, consider isolating or sandboxing components that render user-generated content. Stay updated with vendor advisories for patches or updates addressing this vulnerability and apply them promptly once released. Conduct security awareness training to reduce the risk of successful social engineering that could trigger user interaction requirements.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-05T10:49:39.907Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68baeaa457c5b37b67a460d8
Added to database: 9/5/2025, 1:50:28 PM
Last enriched: 9/5/2025, 2:11:18 PM
Last updated: 9/5/2025, 8:04:45 PM
Views: 1
Related Threats
CVE-2025-58373: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RooCodeInc Roo-Code
MediumCVE-2025-58371: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
CriticalCVE-2025-58372: CWE-732: Incorrect Permission Assignment for Critical Resource in RooCodeInc Roo-Code
HighCVE-2025-58370: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
HighCVE-2025-58369: CWE-400: Uncontrolled Resource Consumption in typelevel fs2
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.