CVE-2025-61994: Cross-site scripting (XSS) in GROWI, Inc. GROWI
Cross-site scripting vulnerability exists in GROWI prior to v7.2.10. If a malicious user creates a page containing crafted contents, an arbitrary script may be executed on the web browser of a victim user who accesses the page.
AI Analysis
Technical Summary
CVE-2025-61994 is a cross-site scripting vulnerability identified in GROWI, a popular open-source collaborative documentation platform developed by GROWI, Inc. The flaw exists in versions prior to 7.2.10, where the application insufficiently sanitizes user-generated content on pages. An attacker with limited privileges can create or modify a page embedding crafted malicious scripts. When a victim user accesses this page, the embedded script executes in their browser context, potentially allowing the attacker to steal session cookies, perform actions on behalf of the user, or conduct further attacks such as phishing or malware delivery. The vulnerability requires the attacker to have some level of authenticated access to create or edit pages and requires the victim to interact by visiting the malicious page. The CVSS v3.0 score of 5.4 reflects a medium severity, with network attack vector, low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. No public exploits are known at this time, but the vulnerability poses a risk to organizations relying on GROWI for internal knowledge sharing and documentation, especially where sensitive information is stored or accessed. The vulnerability is mitigated in version 7.2.10 by improved input validation and output encoding to prevent script injection.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information, session hijacking, and unauthorized actions performed under the victim user's credentials. Organizations using GROWI for internal documentation, project management, or knowledge bases may face risks of data leakage or compromise of user accounts. This is particularly critical in sectors handling confidential or regulated data such as finance, healthcare, government, and critical infrastructure. The attack requires authenticated attacker access, limiting exposure to insider threats or compromised accounts. However, successful exploitation could facilitate lateral movement or privilege escalation within the organization. The lack of availability impact reduces the risk of denial-of-service but does not diminish the confidentiality and integrity concerns. Given no known exploits exist yet, the threat is currently moderate but could escalate if weaponized. European entities with extensive use of GROWI should consider this vulnerability a priority for patching to maintain compliance with data protection regulations like GDPR.
Mitigation Recommendations
1. Upgrade all GROWI instances to version 7.2.10 or later immediately to apply the official patch addressing this XSS vulnerability. 2. Implement strict user access controls and limit page creation or editing privileges to trusted users only, reducing the risk of malicious content injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing GROWI pages. 4. Conduct regular security audits and code reviews of user-generated content handling to detect and remediate similar injection flaws. 5. Educate users about the risks of clicking on untrusted links or pages within the internal documentation platform. 6. Monitor logs for unusual page creation or modification activities that could indicate exploitation attempts. 7. Consider deploying web application firewalls (WAF) with rules targeting XSS attack patterns specific to GROWI. 8. If upgrading is delayed, temporarily disable or restrict page creation/editing features for non-administrative users as a stopgap measure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-61994: Cross-site scripting (XSS) in GROWI, Inc. GROWI
Description
Cross-site scripting vulnerability exists in GROWI prior to v7.2.10. If a malicious user creates a page containing crafted contents, an arbitrary script may be executed on the web browser of a victim user who accesses the page.
AI-Powered Analysis
Technical Analysis
CVE-2025-61994 is a cross-site scripting vulnerability identified in GROWI, a popular open-source collaborative documentation platform developed by GROWI, Inc. The flaw exists in versions prior to 7.2.10, where the application insufficiently sanitizes user-generated content on pages. An attacker with limited privileges can create or modify a page embedding crafted malicious scripts. When a victim user accesses this page, the embedded script executes in their browser context, potentially allowing the attacker to steal session cookies, perform actions on behalf of the user, or conduct further attacks such as phishing or malware delivery. The vulnerability requires the attacker to have some level of authenticated access to create or edit pages and requires the victim to interact by visiting the malicious page. The CVSS v3.0 score of 5.4 reflects a medium severity, with network attack vector, low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. No public exploits are known at this time, but the vulnerability poses a risk to organizations relying on GROWI for internal knowledge sharing and documentation, especially where sensitive information is stored or accessed. The vulnerability is mitigated in version 7.2.10 by improved input validation and output encoding to prevent script injection.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information, session hijacking, and unauthorized actions performed under the victim user's credentials. Organizations using GROWI for internal documentation, project management, or knowledge bases may face risks of data leakage or compromise of user accounts. This is particularly critical in sectors handling confidential or regulated data such as finance, healthcare, government, and critical infrastructure. The attack requires authenticated attacker access, limiting exposure to insider threats or compromised accounts. However, successful exploitation could facilitate lateral movement or privilege escalation within the organization. The lack of availability impact reduces the risk of denial-of-service but does not diminish the confidentiality and integrity concerns. Given no known exploits exist yet, the threat is currently moderate but could escalate if weaponized. European entities with extensive use of GROWI should consider this vulnerability a priority for patching to maintain compliance with data protection regulations like GDPR.
Mitigation Recommendations
1. Upgrade all GROWI instances to version 7.2.10 or later immediately to apply the official patch addressing this XSS vulnerability. 2. Implement strict user access controls and limit page creation or editing privileges to trusted users only, reducing the risk of malicious content injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing GROWI pages. 4. Conduct regular security audits and code reviews of user-generated content handling to detect and remediate similar injection flaws. 5. Educate users about the risks of clicking on untrusted links or pages within the internal documentation platform. 6. Monitor logs for unusual page creation or modification activities that could indicate exploitation attempts. 7. Consider deploying web application firewalls (WAF) with rules targeting XSS attack patterns specific to GROWI. 8. If upgrading is delayed, temporarily disable or restrict page creation/editing features for non-administrative users as a stopgap measure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-10-29T08:38:11.617Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 690c245f6cabeda23da8ace4
Added to database: 11/6/2025, 4:30:23 AM
Last enriched: 11/13/2025, 5:27:41 AM
Last updated: 12/20/2025, 3:33:15 PM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.