Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61623: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Apache Software Foundation Apache OFBiz

0
Medium
VulnerabilityCVE-2025-61623cvecve-2025-61623cwe-79
Published: Wed Nov 12 2025 (11/12/2025, 09:16:58 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache OFBiz

Description

Reflected cross-site scripting vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.03. Users are recommended to upgrade to version 24.09.03, which fixes the issue.

AI-Powered Analysis

AILast updated: 11/19/2025, 11:15:54 UTC

Technical Analysis

CVE-2025-61623 is a reflected cross-site scripting (XSS) vulnerability classified under CWE-79, affecting Apache OFBiz versions before 24.09.03. Apache OFBiz is an open-source enterprise resource planning (ERP) and e-commerce platform widely used for business process automation. The vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing attackers to inject malicious JavaScript code into HTTP responses. Because the vulnerability is reflected, the malicious payload is embedded in a crafted URL or request, which when visited by a victim, executes in their browser context. This can lead to unauthorized actions such as session hijacking, credential theft, or redirection to malicious sites. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, meaning the vulnerability affects only the vulnerable component. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits have been reported in the wild as of the publication date. The recommended remediation is to upgrade Apache OFBiz to version 24.09.03, which includes the necessary input validation and output encoding fixes to neutralize the XSS vectors.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data within Apache OFBiz deployments. Exploitation could lead to unauthorized access to sensitive business information, manipulation of transaction data, or compromise of user accounts. Given Apache OFBiz's role in ERP and e-commerce, successful attacks could disrupt business operations, damage reputation, and result in regulatory compliance issues under GDPR due to potential data breaches. The reflected XSS nature means attackers can craft malicious links to target employees, partners, or customers, increasing the risk of phishing and social engineering attacks. While availability is not directly impacted, indirect effects such as loss of trust or forced downtime for remediation could occur. Organizations with public-facing OFBiz portals are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.

Mitigation Recommendations

European organizations should immediately plan and execute an upgrade of Apache OFBiz to version 24.09.03 or later to remediate the vulnerability. In parallel, implement web application firewall (WAF) rules to detect and block common XSS attack patterns targeting OFBiz endpoints. Conduct thorough input validation and output encoding audits on any custom OFBiz extensions or integrations to prevent similar issues. Educate users and administrators about the risks of clicking on suspicious links and encourage the use of security-aware browsing practices. Monitor logs for unusual request patterns that may indicate attempted exploitation. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing OFBiz applications. Regularly review and update security configurations and ensure timely application of patches for all components. Finally, consider penetration testing or vulnerability scanning focused on XSS to validate the effectiveness of mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-09-29T07:04:49.932Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6914547632a6693f6a1c8ad1

Added to database: 11/12/2025, 9:33:42 AM

Last enriched: 11/19/2025, 11:15:54 AM

Last updated: 2/7/2026, 2:29:55 PM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats