Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65300: n/a

0
Unknown
VulnerabilityCVE-2025-65300cvecve-2025-65300
Published: Tue Dec 09 2025 (12/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored Cross-Site Scripting (XSS) vulnerability exists in the Coohom SaaS Platform feVersion=1760060603897 (2025-10-28) in the Account Settings module, where unsanitized user input in Address fields (City, State, Country/Region) is rendered back to the page. Attackers can inject arbitrary JavaScript code, which executes when the affected profile page is viewed. This can lead to session hijacking, cookie theft, or arbitrary script execution in the victim's browser.

AI-Powered Analysis

AILast updated: 12/09/2025, 19:16:03 UTC

Technical Analysis

CVE-2025-65300 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Coohom SaaS Platform, version feVersion=1760060603897, specifically within the Account Settings module. The vulnerability arises because the platform fails to properly sanitize user input in the Address fields—namely City, State, and Country/Region. When a user inputs malicious JavaScript code into these fields, the code is stored and subsequently rendered back to any user who views the affected profile page. This stored XSS flaw allows attackers to execute arbitrary scripts in the context of the victim's browser session. The consequences include session hijacking, cookie theft, and potentially further exploitation such as credential theft or unauthorized actions performed on behalf of the victim. The vulnerability was published on December 9, 2025, but no CVSS score has been assigned yet, and there are no known exploits in the wild. Exploitation requires the attacker to inject malicious input and the victim to view the compromised profile page, meaning user interaction is necessary. The lack of input sanitization and output encoding in a SaaS platform that likely serves multiple organizations increases the risk of widespread impact if exploited. This vulnerability primarily threatens the confidentiality and integrity of user sessions and data within the Coohom platform.

Potential Impact

For European organizations, this vulnerability poses a significant risk to user data confidentiality and session integrity, especially for those relying on Coohom SaaS for design, architecture, or real estate services where profile and address data are commonly used. Successful exploitation could lead to unauthorized access to user accounts, theft of session cookies, and potential lateral movement within organizational resources if session tokens are reused or linked to internal systems. This could result in data breaches, reputational damage, and compliance violations under GDPR due to unauthorized data exposure. The stored nature of the XSS means that multiple users can be affected once the malicious payload is stored, increasing the attack surface. Although no known exploits exist yet, the ease of injecting malicious scripts into address fields and the commonality of user interaction with profile pages make this a credible threat. The impact on availability is limited, but the integrity and confidentiality impacts are high. Organizations using Coohom SaaS in Europe should consider this vulnerability a priority for remediation to prevent targeted phishing or social engineering campaigns leveraging this flaw.

Mitigation Recommendations

To mitigate this vulnerability, Coohom SaaS platform operators must implement strict input validation and sanitization on all user-supplied data fields, especially those rendered back to users such as City, State, and Country/Region in the Account Settings module. Employing context-aware output encoding (e.g., HTML entity encoding) before rendering user input on web pages is critical to prevent script execution. Additionally, adopting Content Security Policy (CSP) headers can help reduce the impact of any injected scripts by restricting script sources. Organizations using Coohom should monitor user profiles for suspicious input and educate users to be cautious when viewing profiles from untrusted sources. Regular security audits and penetration testing focused on input handling should be conducted. If possible, disabling or restricting the display of user-generated content in sensitive areas until patches are applied can reduce risk. Finally, Coohom should release and communicate patches promptly once available, and organizations should apply them without delay.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693871e8ef540ebbadbcf667

Added to database: 12/9/2025, 7:00:56 PM

Last enriched: 12/9/2025, 7:16:03 PM

Last updated: 12/11/2025, 5:40:57 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats