Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61999: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OPEXUS FOIAXpress

0
Medium
VulnerabilityCVE-2025-61999cvecve-2025-61999cwe-79
Published: Tue Oct 07 2025 (10/07/2025, 23:14:38 UTC)
Source: CVE Database V5
Vendor/Project: OPEXUS
Product: FOIAXpress

Description

OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to upload JavaScript or other content embedded in an SVG image used as a logo. Injected content is executed in the context of other users when they view affected pages. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.

AI-Powered Analysis

AILast updated: 10/15/2025, 00:18:32 UTC

Technical Analysis

CVE-2025-61999 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting OPEXUS FOIAXpress versions prior to 11.13.3.0. The flaw arises because the application improperly neutralizes input during web page generation, specifically allowing an administrative user to upload SVG images containing embedded JavaScript or other executable content as logos. When other users access pages displaying these logos, the embedded scripts execute within their browser context. This can lead to session cookie theft, credential compromise, or unauthorized actions performed on behalf of the victim user. The vulnerability requires an attacker to have administrative privileges to upload the malicious SVG and requires victims to interact with the affected page, making exploitation more complex. The CVSS v3.1 base score is 4.3, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction needed. No public exploits are known at this time, but the vulnerability poses a risk especially in environments where multiple users access FOIAXpress and administrative controls are not tightly managed. The root cause is insufficient input sanitization and output encoding of SVG content uploaded as logos, allowing script injection and execution in other users’ browsers.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive information managed within FOIAXpress, including potentially confidential FOI (Freedom of Information) requests and responses. The ability for an administrative user to inject malicious scripts that execute in other users’ browsers risks session hijacking and credential theft, which could cascade into broader system compromise or data leakage. Given FOIAXpress’s use in managing information requests, exploitation could undermine trust, violate data protection regulations such as GDPR, and cause reputational damage. The requirement for administrative privileges limits the threat to insider threats or compromised admin accounts, but the impact on confidentiality, integrity, and availability of data remains significant. Organizations with multiple users accessing FOIAXpress are at higher risk, especially if administrative controls and monitoring are weak.

Mitigation Recommendations

Organizations should immediately upgrade FOIAXpress to version 11.13.3.0 or later once available to apply the official fix. Until patched, restrict the ability to upload or change logo images to only highly trusted administrators and monitor all administrative activities closely. Implement strict input validation and sanitization on SVG uploads, disallowing embedded scripts or potentially executable content. Employ Content Security Policy (CSP) headers to limit script execution sources and reduce the impact of injected scripts. Conduct regular audits of uploaded images and web content for malicious code. Educate administrators on the risks of uploading untrusted SVG files and enforce multi-factor authentication to reduce the risk of compromised admin accounts. Finally, monitor logs for unusual user activity and access patterns that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-10-07T14:14:16.300Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e5a292a677756fc9a5a212

Added to database: 10/7/2025, 11:30:26 PM

Last enriched: 10/15/2025, 12:18:32 AM

Last updated: 11/20/2025, 6:06:18 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats