Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61994: Cross-site scripting (XSS) in GROWI, Inc. GROWI

0
Medium
VulnerabilityCVE-2025-61994cvecve-2025-61994
Published: Thu Nov 06 2025 (11/06/2025, 04:14:30 UTC)
Source: CVE Database V5
Vendor/Project: GROWI, Inc.
Product: GROWI

Description

Cross-site scripting vulnerability exists in GROWI prior to v7.2.10. If a malicious user creates a page containing crafted contents, an arbitrary script may be executed on the web browser of a victim user who accesses the page.

AI-Powered Analysis

AILast updated: 11/06/2025, 04:45:20 UTC

Technical Analysis

CVE-2025-61994 is a cross-site scripting (XSS) vulnerability identified in GROWI, Inc.'s GROWI product, affecting all versions prior to 7.2.10. The vulnerability arises when a malicious user with the ability to create or edit pages inserts crafted content containing executable scripts. When other users access such a compromised page, the embedded script executes within their browsers under the context of the vulnerable GROWI instance. This can lead to unauthorized actions such as session hijacking, theft of sensitive information, or manipulation of displayed content, thereby compromising confidentiality and integrity. The CVSS 3.0 base score is 5.4, reflecting a medium severity level, with an attack vector of network (remote), low attack complexity, requiring privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the vulnerable component. No known exploits have been reported in the wild, but the vulnerability's presence in collaboration platforms like GROWI poses a risk for insider threats or targeted attacks. The vulnerability was published on November 6, 2025, and remediation involves upgrading to version 7.2.10 or later where the issue is fixed.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive internal information, session hijacking, or manipulation of collaborative content within GROWI instances. Since GROWI is often used for internal documentation and knowledge sharing, exploitation could facilitate lateral movement or privilege escalation in corporate networks. The requirement for an attacker to have page creation privileges limits the attack surface but does not eliminate risk, especially in environments with many users or weak access controls. The vulnerability could also be leveraged in targeted phishing or social engineering campaigns to execute malicious scripts in the browsers of employees. This may result in data breaches, reputational damage, and compliance violations under GDPR if personal or sensitive data is exposed. The medium severity suggests moderate urgency but should not be ignored given the potential for chained attacks.

Mitigation Recommendations

1. Upgrade all GROWI instances to version 7.2.10 or later immediately to apply the official patch addressing this XSS vulnerability. 2. Review and tighten user permissions to restrict page creation and editing rights to trusted personnel only, minimizing the risk of malicious content insertion. 3. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting the execution of unauthorized scripts. 4. Educate users about the risks of interacting with untrusted or unexpected links within internal documentation platforms. 5. Monitor logs for unusual page creation or editing activities that could indicate exploitation attempts. 6. Conduct regular security assessments and penetration tests focusing on collaboration tools like GROWI to detect similar vulnerabilities early. 7. Consider deploying web application firewalls (WAFs) with XSS detection capabilities as an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-10-29T08:38:11.617Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 690c245f6cabeda23da8ace4

Added to database: 11/6/2025, 4:30:23 AM

Last enriched: 11/6/2025, 4:45:20 AM

Last updated: 11/6/2025, 9:49:20 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats