CVE-2025-61999: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OPEXUS FOIAXpress
OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to upload JavaScript or other content embedded in an SVG image used as a logo. Injected content is executed in the context of other users when they view affected pages. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.
AI Analysis
Technical Summary
CVE-2025-61999 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting OPEXUS FOIAXpress versions prior to 11.13.3.0. The flaw arises because the application improperly neutralizes input during web page generation, specifically allowing an administrative user to upload SVG images containing embedded JavaScript or other executable content as logos. When other users access pages displaying these logos, the embedded scripts execute within their browser context. This can lead to session cookie theft, credential compromise, or unauthorized actions performed on behalf of the victim user. The vulnerability requires an attacker to have administrative privileges to upload the malicious SVG and requires victims to interact with the affected page, making exploitation more complex. The CVSS v3.1 base score is 4.3, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction needed. No public exploits are known at this time, but the vulnerability poses a risk especially in environments where multiple users access FOIAXpress and administrative controls are not tightly managed. The root cause is insufficient input sanitization and output encoding of SVG content uploaded as logos, allowing script injection and execution in other users’ browsers.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive information managed within FOIAXpress, including potentially confidential FOI (Freedom of Information) requests and responses. The ability for an administrative user to inject malicious scripts that execute in other users’ browsers risks session hijacking and credential theft, which could cascade into broader system compromise or data leakage. Given FOIAXpress’s use in managing information requests, exploitation could undermine trust, violate data protection regulations such as GDPR, and cause reputational damage. The requirement for administrative privileges limits the threat to insider threats or compromised admin accounts, but the impact on confidentiality, integrity, and availability of data remains significant. Organizations with multiple users accessing FOIAXpress are at higher risk, especially if administrative controls and monitoring are weak.
Mitigation Recommendations
Organizations should immediately upgrade FOIAXpress to version 11.13.3.0 or later once available to apply the official fix. Until patched, restrict the ability to upload or change logo images to only highly trusted administrators and monitor all administrative activities closely. Implement strict input validation and sanitization on SVG uploads, disallowing embedded scripts or potentially executable content. Employ Content Security Policy (CSP) headers to limit script execution sources and reduce the impact of injected scripts. Conduct regular audits of uploaded images and web content for malicious code. Educate administrators on the risks of uploading untrusted SVG files and enforce multi-factor authentication to reduce the risk of compromised admin accounts. Finally, monitor logs for unusual user activity and access patterns that may indicate exploitation attempts.
Affected Countries
United Kingdom, Germany, France, Netherlands, Belgium, Sweden
CVE-2025-61999: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OPEXUS FOIAXpress
Description
OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to upload JavaScript or other content embedded in an SVG image used as a logo. Injected content is executed in the context of other users when they view affected pages. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.
AI-Powered Analysis
Technical Analysis
CVE-2025-61999 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting OPEXUS FOIAXpress versions prior to 11.13.3.0. The flaw arises because the application improperly neutralizes input during web page generation, specifically allowing an administrative user to upload SVG images containing embedded JavaScript or other executable content as logos. When other users access pages displaying these logos, the embedded scripts execute within their browser context. This can lead to session cookie theft, credential compromise, or unauthorized actions performed on behalf of the victim user. The vulnerability requires an attacker to have administrative privileges to upload the malicious SVG and requires victims to interact with the affected page, making exploitation more complex. The CVSS v3.1 base score is 4.3, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction needed. No public exploits are known at this time, but the vulnerability poses a risk especially in environments where multiple users access FOIAXpress and administrative controls are not tightly managed. The root cause is insufficient input sanitization and output encoding of SVG content uploaded as logos, allowing script injection and execution in other users’ browsers.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive information managed within FOIAXpress, including potentially confidential FOI (Freedom of Information) requests and responses. The ability for an administrative user to inject malicious scripts that execute in other users’ browsers risks session hijacking and credential theft, which could cascade into broader system compromise or data leakage. Given FOIAXpress’s use in managing information requests, exploitation could undermine trust, violate data protection regulations such as GDPR, and cause reputational damage. The requirement for administrative privileges limits the threat to insider threats or compromised admin accounts, but the impact on confidentiality, integrity, and availability of data remains significant. Organizations with multiple users accessing FOIAXpress are at higher risk, especially if administrative controls and monitoring are weak.
Mitigation Recommendations
Organizations should immediately upgrade FOIAXpress to version 11.13.3.0 or later once available to apply the official fix. Until patched, restrict the ability to upload or change logo images to only highly trusted administrators and monitor all administrative activities closely. Implement strict input validation and sanitization on SVG uploads, disallowing embedded scripts or potentially executable content. Employ Content Security Policy (CSP) headers to limit script execution sources and reduce the impact of injected scripts. Conduct regular audits of uploaded images and web content for malicious code. Educate administrators on the risks of uploading untrusted SVG files and enforce multi-factor authentication to reduce the risk of compromised admin accounts. Finally, monitor logs for unusual user activity and access patterns that may indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-10-07T14:14:16.300Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e5a292a677756fc9a5a212
Added to database: 10/7/2025, 11:30:26 PM
Last enriched: 10/15/2025, 12:18:32 AM
Last updated: 11/20/2025, 6:06:18 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12502: CWE-89 SQL Injection in attention-bar
UnknownCVE-2025-12778: CWE-862 Missing Authorization in userelements Ultimate Member Widgets for Elementor – WordPress User Directory
MediumRCE via a malicious SVG in mPDF
MediumCVE-2025-13451: SQL Injection in SourceCodester Online Shop Project
MediumCVE-2025-13450: Cross Site Scripting in SourceCodester Online Shop Project
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.