Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62780: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dgtlmoon changedetection.io

0
Low
VulnerabilityCVE-2025-62780cvecve-2025-62780cwe-79
Published: Mon Nov 10 2025 (11/10/2025, 21:18:52 UTC)
Source: CVE Database V5
Vendor/Project: dgtlmoon
Product: changedetection.io

Description

changedetection.io is a free open source web page change detection tool. A Stored Cross Site Scripting is present in changedetection.io Watch update API in versions prior to 0.50.34 due to insufficient security checks. Two scenarios are possible. In the first, an attacker can insert a new watch with an arbitrary URL which really points to a web page. Once the HTML content is retrieved, the attacker updates the URL with a JavaScript payload. In the second, an attacker substitutes the URL in an existing watch with a new URL that is in reality a JavaScript payload. When the user clicks on *Preview* and then on the malicious link, the JavaScript malicious code is executed. Version 0.50.34 fixes the issue.

AI-Powered Analysis

AILast updated: 11/10/2025, 21:35:07 UTC

Technical Analysis

CVE-2025-62780 is a stored cross-site scripting vulnerability identified in the open-source web page change detection tool changedetection.io, specifically in versions prior to 0.50.34. The vulnerability stems from insufficient input validation and sanitization in the Watch update API, which allows an attacker with authenticated access to insert or modify watch URLs to include JavaScript payloads. There are two main exploitation scenarios: first, an attacker creates a new watch with an arbitrary URL that initially points to a legitimate web page, then updates the URL to a malicious JavaScript payload; second, an attacker modifies an existing watch's URL to a JavaScript payload. When a user with access previews the watch and clicks the malicious link, the embedded JavaScript executes in the user's browser context, potentially leading to session hijacking, credential theft, or other client-side attacks. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 3.5, reflecting low severity due to the requirement for authenticated access, user interaction, and the limited scope of impact (confidentiality and integrity only, no availability impact). The issue was publicly disclosed on November 10, 2025, and fixed in version 0.50.34. No known exploits in the wild have been reported to date. The vulnerability highlights the importance of robust input validation and output encoding in web applications, especially those that allow user-generated content or URL manipulation.

Potential Impact

For European organizations using changedetection.io, this vulnerability poses a risk primarily to users with authenticated access who can create or modify watches. Exploitation could lead to client-side script execution, enabling attackers to steal session tokens, perform actions on behalf of users, or conduct phishing attacks within the context of the affected application. Although the CVSS score is low, the impact on confidentiality and integrity can be significant if sensitive data or credentials are exposed. The vulnerability does not affect system availability but could undermine user trust and lead to further compromise if attackers leverage the XSS to escalate privileges or move laterally. Organizations relying on changedetection.io for monitoring critical web content should consider the risk of targeted attacks, especially in environments where multiple users have watch modification privileges. The threat is more pronounced in sectors with high-value targets such as finance, government, or critical infrastructure monitoring, where attackers might seek to exploit trust relationships or gain footholds via client-side attacks.

Mitigation Recommendations

To mitigate CVE-2025-62780, European organizations should immediately upgrade changedetection.io to version 0.50.34 or later, where the vulnerability is patched. Additionally, implement strict access controls to limit watch creation and modification privileges to trusted users only. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct regular security audits and code reviews focusing on input validation and output encoding, especially for user-supplied data. Educate users about the risks of clicking untrusted links within the application interface. If upgrading is not immediately feasible, consider disabling the preview functionality or restricting it to a minimal set of trusted users. Monitor application logs for suspicious watch creation or modification activities that could indicate exploitation attempts. Finally, integrate web application firewalls (WAFs) that can detect and block XSS payloads targeting the application.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-22T18:55:48.007Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69125a3d26655404d5684623

Added to database: 11/10/2025, 9:33:49 PM

Last enriched: 11/10/2025, 9:35:07 PM

Last updated: 11/10/2025, 11:36:13 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats