CVE-2025-62780: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dgtlmoon changedetection.io
changedetection.io is a free open source web page change detection tool. A Stored Cross Site Scripting is present in changedetection.io Watch update API in versions prior to 0.50.34 due to insufficient security checks. Two scenarios are possible. In the first, an attacker can insert a new watch with an arbitrary URL which really points to a web page. Once the HTML content is retrieved, the attacker updates the URL with a JavaScript payload. In the second, an attacker substitutes the URL in an existing watch with a new URL that is in reality a JavaScript payload. When the user clicks on *Preview* and then on the malicious link, the JavaScript malicious code is executed. Version 0.50.34 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-62780 is a stored cross-site scripting vulnerability identified in the open-source web page change detection tool changedetection.io, specifically in versions prior to 0.50.34. The vulnerability stems from insufficient input validation and sanitization in the Watch update API, which allows an attacker with authenticated access to insert or modify watch URLs to include JavaScript payloads. There are two main exploitation scenarios: first, an attacker creates a new watch with an arbitrary URL that initially points to a legitimate web page, then updates the URL to a malicious JavaScript payload; second, an attacker modifies an existing watch's URL to a JavaScript payload. When a user with access previews the watch and clicks the malicious link, the embedded JavaScript executes in the user's browser context, potentially leading to session hijacking, credential theft, or other client-side attacks. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 3.5, reflecting low severity due to the requirement for authenticated access, user interaction, and the limited scope of impact (confidentiality and integrity only, no availability impact). The issue was publicly disclosed on November 10, 2025, and fixed in version 0.50.34. No known exploits in the wild have been reported to date. The vulnerability highlights the importance of robust input validation and output encoding in web applications, especially those that allow user-generated content or URL manipulation.
Potential Impact
For European organizations using changedetection.io, this vulnerability poses a risk primarily to users with authenticated access who can create or modify watches. Exploitation could lead to client-side script execution, enabling attackers to steal session tokens, perform actions on behalf of users, or conduct phishing attacks within the context of the affected application. Although the CVSS score is low, the impact on confidentiality and integrity can be significant if sensitive data or credentials are exposed. The vulnerability does not affect system availability but could undermine user trust and lead to further compromise if attackers leverage the XSS to escalate privileges or move laterally. Organizations relying on changedetection.io for monitoring critical web content should consider the risk of targeted attacks, especially in environments where multiple users have watch modification privileges. The threat is more pronounced in sectors with high-value targets such as finance, government, or critical infrastructure monitoring, where attackers might seek to exploit trust relationships or gain footholds via client-side attacks.
Mitigation Recommendations
To mitigate CVE-2025-62780, European organizations should immediately upgrade changedetection.io to version 0.50.34 or later, where the vulnerability is patched. Additionally, implement strict access controls to limit watch creation and modification privileges to trusted users only. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct regular security audits and code reviews focusing on input validation and output encoding, especially for user-supplied data. Educate users about the risks of clicking untrusted links within the application interface. If upgrading is not immediately feasible, consider disabling the preview functionality or restricting it to a minimal set of trusted users. Monitor application logs for suspicious watch creation or modification activities that could indicate exploitation attempts. Finally, integrate web application firewalls (WAFs) that can detect and block XSS payloads targeting the application.
Affected Countries
Germany, United Kingdom, Netherlands, France, Sweden
CVE-2025-62780: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dgtlmoon changedetection.io
Description
changedetection.io is a free open source web page change detection tool. A Stored Cross Site Scripting is present in changedetection.io Watch update API in versions prior to 0.50.34 due to insufficient security checks. Two scenarios are possible. In the first, an attacker can insert a new watch with an arbitrary URL which really points to a web page. Once the HTML content is retrieved, the attacker updates the URL with a JavaScript payload. In the second, an attacker substitutes the URL in an existing watch with a new URL that is in reality a JavaScript payload. When the user clicks on *Preview* and then on the malicious link, the JavaScript malicious code is executed. Version 0.50.34 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-62780 is a stored cross-site scripting vulnerability identified in the open-source web page change detection tool changedetection.io, specifically in versions prior to 0.50.34. The vulnerability stems from insufficient input validation and sanitization in the Watch update API, which allows an attacker with authenticated access to insert or modify watch URLs to include JavaScript payloads. There are two main exploitation scenarios: first, an attacker creates a new watch with an arbitrary URL that initially points to a legitimate web page, then updates the URL to a malicious JavaScript payload; second, an attacker modifies an existing watch's URL to a JavaScript payload. When a user with access previews the watch and clicks the malicious link, the embedded JavaScript executes in the user's browser context, potentially leading to session hijacking, credential theft, or other client-side attacks. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 3.5, reflecting low severity due to the requirement for authenticated access, user interaction, and the limited scope of impact (confidentiality and integrity only, no availability impact). The issue was publicly disclosed on November 10, 2025, and fixed in version 0.50.34. No known exploits in the wild have been reported to date. The vulnerability highlights the importance of robust input validation and output encoding in web applications, especially those that allow user-generated content or URL manipulation.
Potential Impact
For European organizations using changedetection.io, this vulnerability poses a risk primarily to users with authenticated access who can create or modify watches. Exploitation could lead to client-side script execution, enabling attackers to steal session tokens, perform actions on behalf of users, or conduct phishing attacks within the context of the affected application. Although the CVSS score is low, the impact on confidentiality and integrity can be significant if sensitive data or credentials are exposed. The vulnerability does not affect system availability but could undermine user trust and lead to further compromise if attackers leverage the XSS to escalate privileges or move laterally. Organizations relying on changedetection.io for monitoring critical web content should consider the risk of targeted attacks, especially in environments where multiple users have watch modification privileges. The threat is more pronounced in sectors with high-value targets such as finance, government, or critical infrastructure monitoring, where attackers might seek to exploit trust relationships or gain footholds via client-side attacks.
Mitigation Recommendations
To mitigate CVE-2025-62780, European organizations should immediately upgrade changedetection.io to version 0.50.34 or later, where the vulnerability is patched. Additionally, implement strict access controls to limit watch creation and modification privileges to trusted users only. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct regular security audits and code reviews focusing on input validation and output encoding, especially for user-supplied data. Educate users about the risks of clicking untrusted links within the application interface. If upgrading is not immediately feasible, consider disabling the preview functionality or restricting it to a minimal set of trusted users. Monitor application logs for suspicious watch creation or modification activities that could indicate exploitation attempts. Finally, integrate web application firewalls (WAFs) that can detect and block XSS payloads targeting the application.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-22T18:55:48.007Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69125a3d26655404d5684623
Added to database: 11/10/2025, 9:33:49 PM
Last enriched: 11/10/2025, 9:35:07 PM
Last updated: 11/10/2025, 11:36:13 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63678: n/a
UnknownCVE-2025-11892: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GitHub Enterprise Server
HighCVE-2025-11578: CWE-59 Improper Link Resolution Before File Access ('Link Following') in GitHub Enterprise Server
HighCVE-2025-64529: CWE-770: Allocation of Resources Without Limits or Throttling in authzed spicedb
LowCVE-2025-64522: CWE-918: Server-Side Request Forgery (SSRF) in charmbracelet soft-serve
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.