CVE-2025-65300: n/a
A stored Cross-Site Scripting (XSS) vulnerability exists in the Coohom SaaS Platform feVersion=1760060603897 (2025-10-28) in the Account Settings module, where unsanitized user input in Address fields (City, State, Country/Region) is rendered back to the page. Attackers can inject arbitrary JavaScript code, which executes when the affected profile page is viewed. This can lead to session hijacking, cookie theft, or arbitrary script execution in the victim's browser.
AI Analysis
Technical Summary
CVE-2025-65300 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Coohom SaaS Platform, version feVersion=1760060603897, specifically within the Account Settings module. The vulnerability arises because the platform fails to properly sanitize user input in the Address fields—namely City, State, and Country/Region. When a user inputs malicious JavaScript code into these fields, the code is stored and subsequently rendered back to any user who views the affected profile page. This stored XSS flaw allows attackers to execute arbitrary scripts in the context of the victim's browser session. The consequences include session hijacking, cookie theft, and potentially further exploitation such as credential theft or unauthorized actions performed on behalf of the victim. The vulnerability was published on December 9, 2025, but no CVSS score has been assigned yet, and there are no known exploits in the wild. Exploitation requires the attacker to inject malicious input and the victim to view the compromised profile page, meaning user interaction is necessary. The lack of input sanitization and output encoding in a SaaS platform that likely serves multiple organizations increases the risk of widespread impact if exploited. This vulnerability primarily threatens the confidentiality and integrity of user sessions and data within the Coohom platform.
Potential Impact
For European organizations, this vulnerability poses a significant risk to user data confidentiality and session integrity, especially for those relying on Coohom SaaS for design, architecture, or real estate services where profile and address data are commonly used. Successful exploitation could lead to unauthorized access to user accounts, theft of session cookies, and potential lateral movement within organizational resources if session tokens are reused or linked to internal systems. This could result in data breaches, reputational damage, and compliance violations under GDPR due to unauthorized data exposure. The stored nature of the XSS means that multiple users can be affected once the malicious payload is stored, increasing the attack surface. Although no known exploits exist yet, the ease of injecting malicious scripts into address fields and the commonality of user interaction with profile pages make this a credible threat. The impact on availability is limited, but the integrity and confidentiality impacts are high. Organizations using Coohom SaaS in Europe should consider this vulnerability a priority for remediation to prevent targeted phishing or social engineering campaigns leveraging this flaw.
Mitigation Recommendations
To mitigate this vulnerability, Coohom SaaS platform operators must implement strict input validation and sanitization on all user-supplied data fields, especially those rendered back to users such as City, State, and Country/Region in the Account Settings module. Employing context-aware output encoding (e.g., HTML entity encoding) before rendering user input on web pages is critical to prevent script execution. Additionally, adopting Content Security Policy (CSP) headers can help reduce the impact of any injected scripts by restricting script sources. Organizations using Coohom should monitor user profiles for suspicious input and educate users to be cautious when viewing profiles from untrusted sources. Regular security audits and penetration testing focused on input handling should be conducted. If possible, disabling or restricting the display of user-generated content in sensitive areas until patches are applied can reduce risk. Finally, Coohom should release and communicate patches promptly once available, and organizations should apply them without delay.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-65300: n/a
Description
A stored Cross-Site Scripting (XSS) vulnerability exists in the Coohom SaaS Platform feVersion=1760060603897 (2025-10-28) in the Account Settings module, where unsanitized user input in Address fields (City, State, Country/Region) is rendered back to the page. Attackers can inject arbitrary JavaScript code, which executes when the affected profile page is viewed. This can lead to session hijacking, cookie theft, or arbitrary script execution in the victim's browser.
AI-Powered Analysis
Technical Analysis
CVE-2025-65300 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Coohom SaaS Platform, version feVersion=1760060603897, specifically within the Account Settings module. The vulnerability arises because the platform fails to properly sanitize user input in the Address fields—namely City, State, and Country/Region. When a user inputs malicious JavaScript code into these fields, the code is stored and subsequently rendered back to any user who views the affected profile page. This stored XSS flaw allows attackers to execute arbitrary scripts in the context of the victim's browser session. The consequences include session hijacking, cookie theft, and potentially further exploitation such as credential theft or unauthorized actions performed on behalf of the victim. The vulnerability was published on December 9, 2025, but no CVSS score has been assigned yet, and there are no known exploits in the wild. Exploitation requires the attacker to inject malicious input and the victim to view the compromised profile page, meaning user interaction is necessary. The lack of input sanitization and output encoding in a SaaS platform that likely serves multiple organizations increases the risk of widespread impact if exploited. This vulnerability primarily threatens the confidentiality and integrity of user sessions and data within the Coohom platform.
Potential Impact
For European organizations, this vulnerability poses a significant risk to user data confidentiality and session integrity, especially for those relying on Coohom SaaS for design, architecture, or real estate services where profile and address data are commonly used. Successful exploitation could lead to unauthorized access to user accounts, theft of session cookies, and potential lateral movement within organizational resources if session tokens are reused or linked to internal systems. This could result in data breaches, reputational damage, and compliance violations under GDPR due to unauthorized data exposure. The stored nature of the XSS means that multiple users can be affected once the malicious payload is stored, increasing the attack surface. Although no known exploits exist yet, the ease of injecting malicious scripts into address fields and the commonality of user interaction with profile pages make this a credible threat. The impact on availability is limited, but the integrity and confidentiality impacts are high. Organizations using Coohom SaaS in Europe should consider this vulnerability a priority for remediation to prevent targeted phishing or social engineering campaigns leveraging this flaw.
Mitigation Recommendations
To mitigate this vulnerability, Coohom SaaS platform operators must implement strict input validation and sanitization on all user-supplied data fields, especially those rendered back to users such as City, State, and Country/Region in the Account Settings module. Employing context-aware output encoding (e.g., HTML entity encoding) before rendering user input on web pages is critical to prevent script execution. Additionally, adopting Content Security Policy (CSP) headers can help reduce the impact of any injected scripts by restricting script sources. Organizations using Coohom should monitor user profiles for suspicious input and educate users to be cautious when viewing profiles from untrusted sources. Regular security audits and penetration testing focused on input handling should be conducted. If possible, disabling or restricting the display of user-generated content in sensitive areas until patches are applied can reduce risk. Finally, Coohom should release and communicate patches promptly once available, and organizations should apply them without delay.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693871e8ef540ebbadbcf667
Added to database: 12/9/2025, 7:00:56 PM
Last enriched: 12/9/2025, 7:16:03 PM
Last updated: 12/11/2025, 5:40:57 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.