CVE-2025-61999: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OPEXUS FOIAXpress
OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to upload JavaScript or other content embedded in an SVG image used as a logo. Injected content is executed in the context of other users when they view affected pages. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.
AI Analysis
Technical Summary
CVE-2025-61999 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting OPEXUS FOIAXpress versions prior to 11.13.3.0. The flaw arises because the application improperly neutralizes input during web page generation, specifically allowing an administrative user to upload SVG images containing embedded JavaScript or other executable content as logos. When other users access pages displaying these logos, the embedded scripts execute within their browser context. This can lead to session cookie theft, credential compromise, or unauthorized actions performed on behalf of the victim user. The vulnerability requires an attacker to have administrative privileges to upload the malicious SVG and requires victims to interact with the affected page, making exploitation more complex. The CVSS v3.1 base score is 4.3, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction needed. No public exploits are known at this time, but the vulnerability poses a risk especially in environments where multiple users access FOIAXpress and administrative controls are not tightly managed. The root cause is insufficient input sanitization and output encoding of SVG content uploaded as logos, allowing script injection and execution in other users’ browsers.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive information managed within FOIAXpress, including potentially confidential FOI (Freedom of Information) requests and responses. The ability for an administrative user to inject malicious scripts that execute in other users’ browsers risks session hijacking and credential theft, which could cascade into broader system compromise or data leakage. Given FOIAXpress’s use in managing information requests, exploitation could undermine trust, violate data protection regulations such as GDPR, and cause reputational damage. The requirement for administrative privileges limits the threat to insider threats or compromised admin accounts, but the impact on confidentiality, integrity, and availability of data remains significant. Organizations with multiple users accessing FOIAXpress are at higher risk, especially if administrative controls and monitoring are weak.
Mitigation Recommendations
Organizations should immediately upgrade FOIAXpress to version 11.13.3.0 or later once available to apply the official fix. Until patched, restrict the ability to upload or change logo images to only highly trusted administrators and monitor all administrative activities closely. Implement strict input validation and sanitization on SVG uploads, disallowing embedded scripts or potentially executable content. Employ Content Security Policy (CSP) headers to limit script execution sources and reduce the impact of injected scripts. Conduct regular audits of uploaded images and web content for malicious code. Educate administrators on the risks of uploading untrusted SVG files and enforce multi-factor authentication to reduce the risk of compromised admin accounts. Finally, monitor logs for unusual user activity and access patterns that may indicate exploitation attempts.
Affected Countries
United Kingdom, Germany, France, Netherlands, Belgium, Sweden
CVE-2025-61999: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OPEXUS FOIAXpress
Description
OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to upload JavaScript or other content embedded in an SVG image used as a logo. Injected content is executed in the context of other users when they view affected pages. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.
AI-Powered Analysis
Technical Analysis
CVE-2025-61999 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting OPEXUS FOIAXpress versions prior to 11.13.3.0. The flaw arises because the application improperly neutralizes input during web page generation, specifically allowing an administrative user to upload SVG images containing embedded JavaScript or other executable content as logos. When other users access pages displaying these logos, the embedded scripts execute within their browser context. This can lead to session cookie theft, credential compromise, or unauthorized actions performed on behalf of the victim user. The vulnerability requires an attacker to have administrative privileges to upload the malicious SVG and requires victims to interact with the affected page, making exploitation more complex. The CVSS v3.1 base score is 4.3, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction needed. No public exploits are known at this time, but the vulnerability poses a risk especially in environments where multiple users access FOIAXpress and administrative controls are not tightly managed. The root cause is insufficient input sanitization and output encoding of SVG content uploaded as logos, allowing script injection and execution in other users’ browsers.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive information managed within FOIAXpress, including potentially confidential FOI (Freedom of Information) requests and responses. The ability for an administrative user to inject malicious scripts that execute in other users’ browsers risks session hijacking and credential theft, which could cascade into broader system compromise or data leakage. Given FOIAXpress’s use in managing information requests, exploitation could undermine trust, violate data protection regulations such as GDPR, and cause reputational damage. The requirement for administrative privileges limits the threat to insider threats or compromised admin accounts, but the impact on confidentiality, integrity, and availability of data remains significant. Organizations with multiple users accessing FOIAXpress are at higher risk, especially if administrative controls and monitoring are weak.
Mitigation Recommendations
Organizations should immediately upgrade FOIAXpress to version 11.13.3.0 or later once available to apply the official fix. Until patched, restrict the ability to upload or change logo images to only highly trusted administrators and monitor all administrative activities closely. Implement strict input validation and sanitization on SVG uploads, disallowing embedded scripts or potentially executable content. Employ Content Security Policy (CSP) headers to limit script execution sources and reduce the impact of injected scripts. Conduct regular audits of uploaded images and web content for malicious code. Educate administrators on the risks of uploading untrusted SVG files and enforce multi-factor authentication to reduce the risk of compromised admin accounts. Finally, monitor logs for unusual user activity and access patterns that may indicate exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-10-07T14:14:16.300Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e5a292a677756fc9a5a212
Added to database: 10/7/2025, 11:30:26 PM
Last enriched: 10/15/2025, 12:18:32 AM
Last updated: 1/7/2026, 6:09:40 AM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.