Skip to main content

CVE-2025-58864: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Medium
VulnerabilityCVE-2025-58864cvecve-2025-58864cwe-79
Published: Fri Sep 05 2025 (09/05/2025, 13:45:41 UTC)
Source: CVE Database V5
Vendor/Project: iamroody

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in iamroody 金数据 allows Stored XSS. This issue affects 金数据: from n/a through 1.0.

AI-Powered Analysis

AILast updated: 09/05/2025, 14:07:48 UTC

Technical Analysis

CVE-2025-58864 is a medium-severity vulnerability classified under CWE-79, which corresponds to Improper Neutralization of Input During Web Page Generation, commonly known as Cross-site Scripting (XSS). This vulnerability affects the iamroody 金数据 product up to version 1.0. The issue allows for Stored XSS attacks, where malicious scripts injected by an attacker are permanently stored on the target server (e.g., in a database) and later executed in the browsers of users who access the affected pages. The CVSS 3.1 base score of 6.5 reflects a medium severity level, with the vector indicating that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), but does require privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low level (C:L, I:L, A:L). Stored XSS vulnerabilities can lead to session hijacking, credential theft, defacement, or distribution of malware, depending on the context and the privileges of the victim user. Since the vulnerability is in a web-based data collection or management platform (金数据), attackers could exploit it to target users of the platform, potentially compromising sensitive data or user accounts. No known exploits are reported in the wild yet, and no patches have been linked, indicating that remediation may still be pending or in progress.

Potential Impact

For European organizations using the iamroody 金数据 platform, this vulnerability poses a tangible risk of client-side attacks that could compromise user sessions and data confidentiality. Since the vulnerability requires some level of privilege and user interaction, the threat is more significant for internal users or trusted partners who have access to the platform. Exploitation could lead to unauthorized access to sensitive information, manipulation of data, or disruption of services, impacting business operations and regulatory compliance, especially under GDPR where data breaches must be reported. The stored nature of the XSS means that multiple users could be affected once the malicious payload is stored, amplifying the impact. Organizations relying on 金数据 for data collection or management should be aware that attackers might leverage this vulnerability to target European users, potentially leading to reputational damage and financial loss.

Mitigation Recommendations

Organizations should implement strict input validation and output encoding on all user-supplied data within the 金数据 platform to prevent injection of malicious scripts. Since no official patch is currently linked, temporary mitigations include disabling or restricting user input fields that accept HTML or script content, applying Content Security Policy (CSP) headers to limit script execution sources, and employing web application firewalls (WAFs) with rules to detect and block XSS payloads. User privileges should be minimized to reduce the risk of exploitation, and user awareness training should emphasize the risks of interacting with suspicious content. Monitoring logs for unusual activity and scanning the application for XSS payloads can help detect exploitation attempts. Once an official patch is released, organizations must prioritize its deployment. Additionally, reviewing and sanitizing stored data to remove any malicious scripts is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:50:06.170Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68baeaa657c5b37b67a4616f

Added to database: 9/5/2025, 1:50:30 PM

Last enriched: 9/5/2025, 2:07:48 PM

Last updated: 9/5/2025, 8:04:46 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats