Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63848: n/a

0
Medium
VulnerabilityCVE-2025-63848cvecve-2025-63848
Published: Thu Nov 20 2025 (11/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Stored cross site scripting (xss) vulnerability in SWISH prolog thru 2.2.0 allowing attackers to execute arbitrary code via crafted web IDE notebook.

AI-Powered Analysis

AILast updated: 11/20/2025, 17:21:00 UTC

Technical Analysis

CVE-2025-63848 identifies a stored cross-site scripting vulnerability in SWISH Prolog, a web-based Prolog environment used for interactive programming and educational purposes. The vulnerability exists in versions up to 2.2.0 and allows an attacker to inject malicious scripts into the web IDE notebook interface. Because the XSS is stored, the malicious payload persists on the server and executes whenever a user accesses the infected notebook, enabling arbitrary code execution within the victim's browser context. This can lead to session hijacking, credential theft, or further exploitation of the user's environment. The vulnerability arises from insufficient input validation or output encoding in the notebook interface, allowing crafted inputs to be stored and later rendered unsafely. No CVSS score or patch links are currently available, and no known exploits have been reported, indicating the vulnerability is newly disclosed. The attack vector requires the attacker to have the ability to submit crafted content to the web IDE, which may require authenticated access depending on deployment. The impact is significant due to the persistent nature of the stored XSS and the potential for arbitrary code execution in user browsers. SWISH Prolog is used primarily in academic, research, and development environments, which may have varying levels of security controls. The vulnerability highlights the need for secure coding practices in web-based development tools and the importance of sanitizing user inputs and outputs to prevent script injection.

Potential Impact

For European organizations, especially universities, research institutions, and software development teams using SWISH Prolog, this vulnerability poses a risk of unauthorized code execution within user browsers. Attackers could leverage this to steal session tokens, impersonate users, or pivot to further attacks within the network. The persistent nature of stored XSS increases the risk of widespread compromise among users accessing the affected notebooks. Confidentiality is at risk due to potential data theft, integrity could be compromised by malicious script execution altering user data or interactions, and availability could be indirectly affected if attacks lead to denial of service or system instability. The impact is heightened in environments where sensitive research data or intellectual property is handled. Since the vulnerability affects a niche but critical tool in certain sectors, the overall scope is limited but significant within those contexts. The lack of known exploits suggests a window for proactive mitigation before widespread abuse occurs.

Mitigation Recommendations

Organizations should immediately review their use of SWISH Prolog and restrict access to the web IDE notebook interface to trusted users only. Implement strict input validation and output encoding in the notebook interface to prevent script injection. Monitor and audit user-submitted content for suspicious inputs. Where possible, deploy web application firewalls (WAFs) with rules to detect and block XSS payloads targeting SWISH Prolog. Stay alert for official patches or updates from the SWISH Prolog maintainers and apply them promptly once available. Educate users about the risks of interacting with untrusted notebooks or links. Consider isolating the SWISH Prolog environment from critical infrastructure to limit potential lateral movement. Employ Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. Finally, conduct regular security assessments of web-based development tools to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691f4b4ed2e902043d281084

Added to database: 11/20/2025, 5:09:34 PM

Last enriched: 11/20/2025, 5:21:00 PM

Last updated: 11/22/2025, 12:27:11 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats