CVE-2025-60249: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in CIRCL vulnerability-lookup
vulnerability-lookup 2.16.0 allows XSS in bundle.py, comment.py, and user.py, by a user on a vulnerability-lookup instance who can add bundles, comments, or sightings. A cross-site scripting (XSS) vulnerability was discovered in the handling of user-supplied input in the Bundles, Comments, and Sightings components. Untrusted data was not properly sanitized before being rendered in templates and tables, which could allow attackers to inject arbitrary JavaScript into the application. The issue was due to unsafe use of innerHTML and insufficient validation of dynamic URLs and model fields. This vulnerability has been fixed by escaping untrusted data, replacing innerHTML assignments with safer DOM methods, encoding URLs with encodeURIComponent, and improving input validation in the affected models.
AI Analysis
Technical Summary
CVE-2025-60249 is a medium-severity Cross-Site Scripting (XSS) vulnerability identified in version 2.16.0 of the CIRCL vulnerability-lookup application. The vulnerability arises from improper neutralization of user-supplied input during web page generation, specifically within the Bundles, Comments, and Sightings components of the application. In these components, untrusted data is rendered directly into HTML templates and tables using unsafe innerHTML assignments without adequate sanitization or validation. This unsafe handling allows an authenticated user with privileges to add bundles, comments, or sightings to inject arbitrary JavaScript code into the application interface. The vulnerability stems from insufficient validation of dynamic URLs and model fields, as well as the use of innerHTML instead of safer DOM manipulation methods. Successful exploitation could lead to the execution of malicious scripts in the context of other users’ browsers, potentially resulting in session hijacking, unauthorized actions, or data theft within the application. The vulnerability has been addressed by escaping untrusted data, replacing innerHTML assignments with safer DOM methods, encoding URLs with encodeURIComponent, and enhancing input validation in the affected models. The CVSS v3.1 base score is 6.4, reflecting a network-exploitable vulnerability requiring low privileges but no user interaction, with partial impact on confidentiality and integrity, and no impact on availability. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using CIRCL vulnerability-lookup 2.16.0, this XSS vulnerability poses a risk of unauthorized script execution within the application’s user interface. Given that the vulnerability requires authenticated user privileges to add content, the threat primarily concerns insider threats or compromised user accounts. Exploitation could allow attackers to hijack sessions, manipulate displayed data, or perform unauthorized actions on behalf of other users, undermining data integrity and confidentiality. This could be particularly impactful for security teams relying on vulnerability-lookup for managing and sharing sensitive vulnerability intelligence, potentially leading to misinformation, data leakage, or disruption of security workflows. The vulnerability does not affect availability directly but could degrade trust in the platform. European organizations with stringent data protection regulations (e.g., GDPR) may face compliance risks if sensitive information is exposed or manipulated. Additionally, the collaborative nature of CIRCL’s platform means that exploitation could propagate malicious scripts across multiple users and organizations, amplifying the impact.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade CIRCL vulnerability-lookup to a version where the issue is fixed, or apply vendor-provided patches if available. In the absence of immediate patches, organizations should implement strict input validation and sanitization on all user-supplied data before rendering it in the UI. Replace any use of innerHTML with safer DOM manipulation methods such as textContent or createElement to prevent injection of executable code. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS attacks. Limit the privileges of users who can add bundles, comments, or sightings to trusted personnel only, and monitor logs for suspicious activity indicative of exploitation attempts. Conduct regular security audits and penetration testing focused on input handling and client-side scripting vulnerabilities. Educate users about the risks of XSS and encourage reporting of unusual application behavior. Finally, ensure that URL encoding functions like encodeURIComponent are consistently used when handling dynamic URLs to prevent injection via crafted links.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Switzerland, Luxembourg
CVE-2025-60249: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in CIRCL vulnerability-lookup
Description
vulnerability-lookup 2.16.0 allows XSS in bundle.py, comment.py, and user.py, by a user on a vulnerability-lookup instance who can add bundles, comments, or sightings. A cross-site scripting (XSS) vulnerability was discovered in the handling of user-supplied input in the Bundles, Comments, and Sightings components. Untrusted data was not properly sanitized before being rendered in templates and tables, which could allow attackers to inject arbitrary JavaScript into the application. The issue was due to unsafe use of innerHTML and insufficient validation of dynamic URLs and model fields. This vulnerability has been fixed by escaping untrusted data, replacing innerHTML assignments with safer DOM methods, encoding URLs with encodeURIComponent, and improving input validation in the affected models.
AI-Powered Analysis
Technical Analysis
CVE-2025-60249 is a medium-severity Cross-Site Scripting (XSS) vulnerability identified in version 2.16.0 of the CIRCL vulnerability-lookup application. The vulnerability arises from improper neutralization of user-supplied input during web page generation, specifically within the Bundles, Comments, and Sightings components of the application. In these components, untrusted data is rendered directly into HTML templates and tables using unsafe innerHTML assignments without adequate sanitization or validation. This unsafe handling allows an authenticated user with privileges to add bundles, comments, or sightings to inject arbitrary JavaScript code into the application interface. The vulnerability stems from insufficient validation of dynamic URLs and model fields, as well as the use of innerHTML instead of safer DOM manipulation methods. Successful exploitation could lead to the execution of malicious scripts in the context of other users’ browsers, potentially resulting in session hijacking, unauthorized actions, or data theft within the application. The vulnerability has been addressed by escaping untrusted data, replacing innerHTML assignments with safer DOM methods, encoding URLs with encodeURIComponent, and enhancing input validation in the affected models. The CVSS v3.1 base score is 6.4, reflecting a network-exploitable vulnerability requiring low privileges but no user interaction, with partial impact on confidentiality and integrity, and no impact on availability. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using CIRCL vulnerability-lookup 2.16.0, this XSS vulnerability poses a risk of unauthorized script execution within the application’s user interface. Given that the vulnerability requires authenticated user privileges to add content, the threat primarily concerns insider threats or compromised user accounts. Exploitation could allow attackers to hijack sessions, manipulate displayed data, or perform unauthorized actions on behalf of other users, undermining data integrity and confidentiality. This could be particularly impactful for security teams relying on vulnerability-lookup for managing and sharing sensitive vulnerability intelligence, potentially leading to misinformation, data leakage, or disruption of security workflows. The vulnerability does not affect availability directly but could degrade trust in the platform. European organizations with stringent data protection regulations (e.g., GDPR) may face compliance risks if sensitive information is exposed or manipulated. Additionally, the collaborative nature of CIRCL’s platform means that exploitation could propagate malicious scripts across multiple users and organizations, amplifying the impact.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade CIRCL vulnerability-lookup to a version where the issue is fixed, or apply vendor-provided patches if available. In the absence of immediate patches, organizations should implement strict input validation and sanitization on all user-supplied data before rendering it in the UI. Replace any use of innerHTML with safer DOM manipulation methods such as textContent or createElement to prevent injection of executable code. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS attacks. Limit the privileges of users who can add bundles, comments, or sightings to trusted personnel only, and monitor logs for suspicious activity indicative of exploitation attempts. Conduct regular security audits and penetration testing focused on input handling and client-side scripting vulnerabilities. Educate users about the risks of XSS and encourage reporting of unusual application behavior. Finally, ensure that URL encoding functions like encodeURIComponent are consistently used when handling dynamic URLs to prevent injection via crafted links.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-25T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d57a717f709e48c38d3def
Added to database: 9/25/2025, 5:22:57 PM
Last enriched: 9/25/2025, 5:23:14 PM
Last updated: 9/25/2025, 8:21:47 PM
Views: 6
Related Threats
CVE-2025-10975: Deserialization in GuanxingLu vlarl
MediumCVE-2025-10974: Deserialization in giantspatula SewKinect
MediumCVE-2025-26482: CWE-1258: Exposure of Sensitive System Information Due to Uncleared Debug Information in Dell PowerEdge R770
MediumCVE-2025-10973: SQL Injection in JackieDYH Resume-management-system
MediumCVE-2025-11005: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TOTOLINK X6000R
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.