CVE-2025-61996: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OPEXUS FOIAXpress
OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content within the Annual Report Template. Injected content is executed in the context of other users when they generate an Annual Report. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.
AI Analysis
Technical Summary
CVE-2025-61996 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting OPEXUS FOIAXpress versions prior to 11.13.3.0. The vulnerability arises from improper neutralization of input during web page generation, specifically within the Annual Report Template feature. An administrative user can inject arbitrary JavaScript or other executable content into this template. When other users generate an Annual Report, the injected script executes in their browser context, potentially allowing the attacker to perform actions on behalf of the victim user. This includes stealing session cookies, user credentials, or other sensitive information accessible within the application session. The vulnerability requires that the attacker has administrative privileges to inject the malicious content and that the victim user interacts with the Annual Report generation functionality, making exploitation less trivial but still impactful. The CVSS v3.1 score is 4.3 (medium severity), reflecting network attack vector with low complexity, but requiring high privileges and user interaction. No public exploits have been reported yet. The vulnerability highlights insufficient input validation and output encoding in the FOIAXpress reporting module, which should be addressed by applying patches or implementing strict input sanitization and content security policies.
Potential Impact
For European organizations, especially those in government, public administration, or entities handling freedom of information requests, this vulnerability poses a risk to the confidentiality and integrity of sensitive data. Attackers with administrative access could leverage this flaw to compromise user sessions, steal credentials, or manipulate report content, potentially leading to unauthorized data disclosure or fraudulent report generation. Although exploitation requires administrative privileges and user interaction, insider threats or compromised admin accounts could facilitate attacks. The impact on availability is limited but possible if malicious scripts disrupt report generation or application functionality. Given the use of FOIAXpress in managing public information requests, exploitation could undermine trust and compliance with data protection regulations such as GDPR. Organizations may face reputational damage and regulatory scrutiny if sensitive information is exposed or manipulated.
Mitigation Recommendations
Organizations should immediately upgrade OPEXUS FOIAXpress to version 11.13.3.0 or later where the vulnerability is fixed. Until patching is possible, restrict administrative access strictly to trusted personnel and monitor for unusual template modifications. Implement input validation and output encoding on all user-supplied content within report templates to prevent script injection. Employ Content Security Policy (CSP) headers to limit script execution sources and reduce XSS impact. Conduct regular audits of report templates for unauthorized changes. Educate administrative users about the risks of injecting untrusted content. Additionally, enable multi-factor authentication (MFA) for administrative accounts to reduce the risk of credential compromise. Monitor application logs for suspicious activity related to report generation and user sessions. Consider isolating FOIAXpress environments to limit lateral movement if compromise occurs.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Denmark
CVE-2025-61996: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OPEXUS FOIAXpress
Description
OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content within the Annual Report Template. Injected content is executed in the context of other users when they generate an Annual Report. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.
AI-Powered Analysis
Technical Analysis
CVE-2025-61996 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting OPEXUS FOIAXpress versions prior to 11.13.3.0. The vulnerability arises from improper neutralization of input during web page generation, specifically within the Annual Report Template feature. An administrative user can inject arbitrary JavaScript or other executable content into this template. When other users generate an Annual Report, the injected script executes in their browser context, potentially allowing the attacker to perform actions on behalf of the victim user. This includes stealing session cookies, user credentials, or other sensitive information accessible within the application session. The vulnerability requires that the attacker has administrative privileges to inject the malicious content and that the victim user interacts with the Annual Report generation functionality, making exploitation less trivial but still impactful. The CVSS v3.1 score is 4.3 (medium severity), reflecting network attack vector with low complexity, but requiring high privileges and user interaction. No public exploits have been reported yet. The vulnerability highlights insufficient input validation and output encoding in the FOIAXpress reporting module, which should be addressed by applying patches or implementing strict input sanitization and content security policies.
Potential Impact
For European organizations, especially those in government, public administration, or entities handling freedom of information requests, this vulnerability poses a risk to the confidentiality and integrity of sensitive data. Attackers with administrative access could leverage this flaw to compromise user sessions, steal credentials, or manipulate report content, potentially leading to unauthorized data disclosure or fraudulent report generation. Although exploitation requires administrative privileges and user interaction, insider threats or compromised admin accounts could facilitate attacks. The impact on availability is limited but possible if malicious scripts disrupt report generation or application functionality. Given the use of FOIAXpress in managing public information requests, exploitation could undermine trust and compliance with data protection regulations such as GDPR. Organizations may face reputational damage and regulatory scrutiny if sensitive information is exposed or manipulated.
Mitigation Recommendations
Organizations should immediately upgrade OPEXUS FOIAXpress to version 11.13.3.0 or later where the vulnerability is fixed. Until patching is possible, restrict administrative access strictly to trusted personnel and monitor for unusual template modifications. Implement input validation and output encoding on all user-supplied content within report templates to prevent script injection. Employ Content Security Policy (CSP) headers to limit script execution sources and reduce XSS impact. Conduct regular audits of report templates for unauthorized changes. Educate administrative users about the risks of injecting untrusted content. Additionally, enable multi-factor authentication (MFA) for administrative accounts to reduce the risk of credential compromise. Monitor application logs for suspicious activity related to report generation and user sessions. Consider isolating FOIAXpress environments to limit lateral movement if compromise occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-10-07T14:13:54.500Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e5a292a677756fc9a5a203
Added to database: 10/7/2025, 11:30:26 PM
Last enriched: 10/7/2025, 11:46:05 PM
Last updated: 10/8/2025, 4:54:49 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11432: SQL Injection in itsourcecode Leave Management System
MediumCVE-2025-11431: SQL Injection in code-projects Web-Based Inventory and POS System
MediumCVE-2025-11430: SQL Injection in SourceCodester Simple E-Commerce Bookstore
MediumCVE-2025-10587: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in jackdewey Community Events
CriticalCVE-2025-10494: CWE-73 External Control of File Name or Path in stylemix Motors – Car Dealership & Classified Listings Plugin
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.