CVE-2025-58873: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pusheco Pushe Web Push Notification
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pusheco Pushe Web Push Notification allows Stored XSS. This issue affects Pushe Web Push Notification: from n/a through 0.5.0.
AI Analysis
Technical Summary
CVE-2025-58873 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability identified in the pusheco Pushe Web Push Notification product, affecting versions up to 0.5.0. This vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. Specifically, the application fails to adequately sanitize or encode user-supplied input before rendering it in web pages, allowing malicious actors to inject and store arbitrary JavaScript code. When other users or administrators access the affected pages, the malicious script executes in their browsers within the context of the vulnerable domain. The CVSS v3.1 base score is 5.9, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality, integrity, and availability losses, as the attacker can execute scripts that may steal session tokens, manipulate page content, or perform actions on behalf of the user. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability requires an attacker to have high privileges and to trick a user into interacting with the malicious payload, which somewhat limits exploitation but does not eliminate risk. Stored XSS is particularly dangerous because the malicious payload persists on the server and can affect multiple users over time.
Potential Impact
For European organizations using Pushe Web Push Notification, this vulnerability poses a risk of session hijacking, unauthorized actions, or data leakage through malicious script execution in users’ browsers. Given that push notifications often integrate with customer-facing websites or internal dashboards, exploitation could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations if personal data is exposed), and potential financial losses. The requirement for high privileges to inject the payload suggests insider threats or compromised administrator accounts are the most likely attack vectors. However, once injected, any user accessing the affected pages could be impacted. This could disrupt business operations, especially if the push notification system is critical for customer engagement or internal communications. The scope change in the CVSS vector indicates that the vulnerability could affect other components or data beyond the immediate application, increasing the potential impact. European organizations must be vigilant, particularly those in sectors with strict data protection requirements or high reliance on web-based notification systems.
Mitigation Recommendations
Organizations should prioritize the following mitigations: 1) Immediately audit and restrict administrative access to the Pushe Web Push Notification system to minimize the risk of privilege abuse. 2) Implement strict input validation and output encoding on all user-supplied data rendered in web pages, following OWASP XSS prevention guidelines. 3) Deploy Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script sources. 4) Monitor logs for unusual administrative activities or injection attempts. 5) Isolate the push notification system from critical internal networks to limit lateral movement if compromised. 6) Engage with the vendor or community to obtain patches or updates as soon as they become available and apply them promptly. 7) Conduct regular security assessments and penetration tests focusing on web application vulnerabilities, including stored XSS. 8) Educate users and administrators about phishing and social engineering risks that could facilitate exploitation. These steps go beyond generic advice by emphasizing access control, proactive monitoring, and layered defenses tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-58873: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pusheco Pushe Web Push Notification
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pusheco Pushe Web Push Notification allows Stored XSS. This issue affects Pushe Web Push Notification: from n/a through 0.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-58873 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability identified in the pusheco Pushe Web Push Notification product, affecting versions up to 0.5.0. This vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. Specifically, the application fails to adequately sanitize or encode user-supplied input before rendering it in web pages, allowing malicious actors to inject and store arbitrary JavaScript code. When other users or administrators access the affected pages, the malicious script executes in their browsers within the context of the vulnerable domain. The CVSS v3.1 base score is 5.9, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality, integrity, and availability losses, as the attacker can execute scripts that may steal session tokens, manipulate page content, or perform actions on behalf of the user. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability requires an attacker to have high privileges and to trick a user into interacting with the malicious payload, which somewhat limits exploitation but does not eliminate risk. Stored XSS is particularly dangerous because the malicious payload persists on the server and can affect multiple users over time.
Potential Impact
For European organizations using Pushe Web Push Notification, this vulnerability poses a risk of session hijacking, unauthorized actions, or data leakage through malicious script execution in users’ browsers. Given that push notifications often integrate with customer-facing websites or internal dashboards, exploitation could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations if personal data is exposed), and potential financial losses. The requirement for high privileges to inject the payload suggests insider threats or compromised administrator accounts are the most likely attack vectors. However, once injected, any user accessing the affected pages could be impacted. This could disrupt business operations, especially if the push notification system is critical for customer engagement or internal communications. The scope change in the CVSS vector indicates that the vulnerability could affect other components or data beyond the immediate application, increasing the potential impact. European organizations must be vigilant, particularly those in sectors with strict data protection requirements or high reliance on web-based notification systems.
Mitigation Recommendations
Organizations should prioritize the following mitigations: 1) Immediately audit and restrict administrative access to the Pushe Web Push Notification system to minimize the risk of privilege abuse. 2) Implement strict input validation and output encoding on all user-supplied data rendered in web pages, following OWASP XSS prevention guidelines. 3) Deploy Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script sources. 4) Monitor logs for unusual administrative activities or injection attempts. 5) Isolate the push notification system from critical internal networks to limit lateral movement if compromised. 6) Engage with the vendor or community to obtain patches or updates as soon as they become available and apply them promptly. 7) Conduct regular security assessments and penetration tests focusing on web application vulnerabilities, including stored XSS. 8) Educate users and administrators about phishing and social engineering risks that could facilitate exploitation. These steps go beyond generic advice by emphasizing access control, proactive monitoring, and layered defenses tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-05T10:50:17.982Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68baeaa757c5b37b67a461ae
Added to database: 9/5/2025, 1:50:31 PM
Last enriched: 9/5/2025, 2:04:45 PM
Last updated: 9/5/2025, 8:04:46 PM
Views: 3
Related Threats
CVE-2025-58366: CWE-522: Insufficiently Protected Credentials in InseeFrLab onyxia
CriticalCVE-2025-10027: Cross Site Scripting in itsourcecode POS Point of Sale System
MediumCVE-2025-10060: CWE-672 Operation on a Resource after Expiration or Release in MongoDB Inc MongoDB Server
MediumCVE-2025-10061: CWE-20 Improper Input Validation in MongoDB Inc MongoDB Server
MediumCVE-2025-53791: CWE-284: Improper Access Control in Microsoft Microsoft Edge (Chromium-based)
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.