Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59763: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in AndSoft e-TMS

0
Medium
VulnerabilityCVE-2025-59763cvecve-2025-59763cwe-79
Published: Thu Oct 02 2025 (10/02/2025, 14:36:12 UTC)
Source: CVE Database V5
Vendor/Project: AndSoft
Product: e-TMS

Description

Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL. The relationship between parameter and assigned identifier is 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters in '/clt/LOGINFRM_EK.ASP'.

AI-Powered Analysis

AILast updated: 10/02/2025, 14:44:13 UTC

Technical Analysis

CVE-2025-59763 is a reflected Cross-site Scripting (XSS) vulnerability identified in AndSoft's e-TMS version 25.03. This vulnerability arises from improper neutralization of input during web page generation, specifically involving the parameters 'l', 'demo', 'demo2', 'TNTLOGIN', 'UO', and 'SuppConn' within the '/clt/LOGINFRM_EK.ASP' endpoint. An attacker can craft a malicious URL containing JavaScript code embedded in these parameters, which, when visited by a victim, executes the script in the victim's browser context. This reflected XSS does not require prior authentication (no privileges needed) but does require user interaction in the form of clicking or visiting a malicious link. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based (remote), with low attack complexity and no privileges required. The impact primarily affects confidentiality due to potential theft of session cookies or sensitive data accessible via the browser, with limited impact on integrity and availability. The scope is limited to the vulnerable web application instance, and no known exploits are currently reported in the wild. The vulnerability is classified under CWE-79, which covers improper input neutralization leading to XSS. The lack of available patches at the time of publication suggests that organizations using e-TMS v25.03 remain exposed until remediation is provided or mitigations are implemented.

Potential Impact

For European organizations using AndSoft e-TMS v25.03, this vulnerability poses a risk of client-side attacks that can lead to session hijacking, credential theft, or unauthorized actions performed in the context of the victim's session. This can result in unauthorized access to transportation management data, disruption of logistics operations, or leakage of sensitive business information. Given that e-TMS is a transportation management system, attackers exploiting this vulnerability could potentially manipulate shipment data or intercept confidential communications. The reflected XSS nature means phishing or social engineering campaigns could be used to lure employees into clicking malicious links, increasing the risk of successful exploitation. While the vulnerability does not directly compromise server integrity or availability, the indirect consequences of compromised user sessions can be significant, including reputational damage and regulatory compliance issues under GDPR if personal data is exposed. The medium severity rating reflects these risks, emphasizing the need for timely mitigation to prevent exploitation in European enterprises relying on this software.

Mitigation Recommendations

Specific mitigation steps include: 1) Immediate implementation of input validation and output encoding on the affected parameters ('l', 'demo', 'demo2', 'TNTLOGIN', 'UO', 'SuppConn') within the '/clt/LOGINFRM_EK.ASP' page to ensure that any user-supplied data is properly sanitized before rendering in the browser. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3) Educate users on the risks of clicking unsolicited or suspicious links, particularly those purporting to be related to e-TMS login pages. 4) Monitor web server logs for unusual URL parameters or repeated access attempts with suspicious payloads. 5) If possible, isolate the e-TMS application behind web application firewalls (WAFs) configured to detect and block XSS attack patterns targeting the specified parameters. 6) Coordinate with AndSoft for timely patch releases and apply updates as soon as they become available. 7) Review and enhance session management controls to limit the impact of session hijacking, such as implementing short session timeouts and multi-factor authentication for e-TMS access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-09-19T11:43:28.892Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68de8eda779290c94ba70b70

Added to database: 10/2/2025, 2:40:26 PM

Last enriched: 10/2/2025, 2:44:13 PM

Last updated: 10/7/2025, 1:41:15 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats