Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60917: n/a

0
Unknown
VulnerabilityCVE-2025-60917cvecve-2025-60917
Published: Mon Nov 24 2025 (11/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A reflected cross-site scripting (XSS) vulnerability in the /overview/network/ endpoint of Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload into the color parameter.

AI-Powered Analysis

AILast updated: 11/24/2025, 16:12:53 UTC

Technical Analysis

CVE-2025-60917 is a reflected cross-site scripting (XSS) vulnerability identified in the Openatlas software developed by the Austrian Archaeological Institute, specifically affecting the /overview/network/ endpoint. The vulnerability exists due to insufficient input validation and output encoding of the 'color' parameter, which allows an attacker to craft a malicious payload that is reflected back in the HTTP response. When a user visits a specially crafted URL containing this payload, the malicious script executes within the user's browser context. This can lead to a range of attacks including session hijacking, theft of sensitive information such as cookies or credentials, and unauthorized actions performed with the user's privileges. The vulnerability does not require authentication but does require user interaction, such as clicking a malicious link. There is no CVSS score assigned yet, and no known exploits have been reported in the wild. The vulnerability affects versions of Openatlas prior to 8.12.0, which is the version that presumably contains the fix. Openatlas is a specialized software used primarily in archaeological research and cultural heritage management, which means the affected user base is niche but critical. The lack of patch links suggests that users should seek updates directly from the vendor or maintainers. The reflected XSS nature means the attack surface is limited to users who can be tricked into visiting malicious URLs, but the impact on confidentiality and integrity can be significant if exploited.

Potential Impact

For European organizations, particularly those involved in archaeological research, cultural heritage, and academic institutions using Openatlas, this vulnerability poses a significant risk. Exploitation can lead to unauthorized access to user sessions, theft of sensitive research data, and potential compromise of user accounts. Given the specialized nature of the software, the impact is concentrated but critical for affected entities. The vulnerability could also be leveraged as a foothold for further attacks within the network if attackers gain access to privileged accounts. Additionally, the trustworthiness of research data and collaboration platforms could be undermined, affecting the integrity of scientific work. Since the vulnerability requires user interaction, phishing campaigns targeting researchers and staff are a likely attack vector. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed. European organizations must consider the potential reputational damage and operational disruption that could result from exploitation.

Mitigation Recommendations

Organizations should immediately verify if they are running a vulnerable version of Openatlas prior to 8.12.0 and plan to upgrade to version 8.12.0 or later where the vulnerability is fixed. In the interim, implement strict input validation and output encoding on the 'color' parameter at the application level to neutralize malicious payloads. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Educate users to be cautious of unsolicited links, especially those that appear to interact with the Openatlas platform. Monitor web server logs for suspicious requests targeting the /overview/network/ endpoint with unusual 'color' parameter values. Consider deploying web application firewalls (WAFs) with rules designed to detect and block reflected XSS attempts. Regularly review and update security policies related to web application usage and incident response plans tailored to phishing and XSS attack scenarios. Engage with the software vendor or community to obtain official patches and security advisories promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69248078d5a1e53350b077a3

Added to database: 11/24/2025, 3:57:44 PM

Last enriched: 11/24/2025, 4:12:53 PM

Last updated: 11/24/2025, 5:19:38 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats