CVE-2025-65622: n/a
Snipe-IT before 8.3.4 allows stored XSS via the Locations "Country" field, enabling a low-privileged authenticated user to inject JavaScript that executes in another user's session.
AI Analysis
Technical Summary
CVE-2025-65622 is a stored cross-site scripting (XSS) vulnerability identified in the open-source asset management software Snipe-IT, affecting versions prior to 8.3.4. The vulnerability arises from insufficient sanitization of user input in the 'Country' field within the Locations module. A low-privileged authenticated user can exploit this flaw by injecting malicious JavaScript code into this field. When other users access the affected page or data, the injected script executes within their browser context, potentially allowing the attacker to hijack sessions, steal cookies, perform actions on behalf of the victim, or conduct further attacks such as phishing or privilege escalation. The vulnerability requires the attacker to have an authenticated account and for victims to interact with the maliciously crafted content, limiting the attack surface. The CVSS 3.1 base score of 5.4 reflects a medium severity, considering the network attack vector, low complexity, required privileges, and user interaction. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, but the presence of this vulnerability in a widely used asset management platform poses a tangible risk, especially in environments where multiple users access the system regularly. The CWE-79 classification confirms this as a classic stored XSS issue, emphasizing the need for proper input validation and output encoding to prevent script injection.
Potential Impact
For European organizations, the impact of CVE-2025-65622 can be significant, particularly for those relying on Snipe-IT for managing IT assets and inventory. Successful exploitation could lead to unauthorized access to user sessions, enabling attackers to impersonate legitimate users and potentially manipulate asset data or gain further foothold within the network. This undermines the confidentiality and integrity of the asset management system, potentially disrupting operational workflows and leading to data breaches. While availability is not directly impacted, the trustworthiness of the system is compromised. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, may face regulatory and reputational consequences if this vulnerability is exploited. The requirement for authentication and user interaction reduces the likelihood of widespread automated attacks but does not eliminate targeted exploitation risks, especially in environments with many users or where user privileges are not tightly controlled.
Mitigation Recommendations
To mitigate CVE-2025-65622, European organizations should immediately upgrade Snipe-IT to version 8.3.4 or later, where the vulnerability has been addressed. In environments where immediate patching is not feasible, implement strict input validation on the 'Country' field to reject or sanitize potentially malicious input. Employ robust output encoding techniques to ensure that any user-supplied data rendered in the browser does not execute as code. Additionally, enforce the principle of least privilege by limiting user permissions to only what is necessary, reducing the risk posed by low-privileged users. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Monitor logs and user activities for unusual behavior that may indicate exploitation attempts. Educate users about the risks of interacting with suspicious content within the application. Finally, conduct regular security assessments and code reviews focusing on input handling and XSS vulnerabilities to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-65622: n/a
Description
Snipe-IT before 8.3.4 allows stored XSS via the Locations "Country" field, enabling a low-privileged authenticated user to inject JavaScript that executes in another user's session.
AI-Powered Analysis
Technical Analysis
CVE-2025-65622 is a stored cross-site scripting (XSS) vulnerability identified in the open-source asset management software Snipe-IT, affecting versions prior to 8.3.4. The vulnerability arises from insufficient sanitization of user input in the 'Country' field within the Locations module. A low-privileged authenticated user can exploit this flaw by injecting malicious JavaScript code into this field. When other users access the affected page or data, the injected script executes within their browser context, potentially allowing the attacker to hijack sessions, steal cookies, perform actions on behalf of the victim, or conduct further attacks such as phishing or privilege escalation. The vulnerability requires the attacker to have an authenticated account and for victims to interact with the maliciously crafted content, limiting the attack surface. The CVSS 3.1 base score of 5.4 reflects a medium severity, considering the network attack vector, low complexity, required privileges, and user interaction. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, but the presence of this vulnerability in a widely used asset management platform poses a tangible risk, especially in environments where multiple users access the system regularly. The CWE-79 classification confirms this as a classic stored XSS issue, emphasizing the need for proper input validation and output encoding to prevent script injection.
Potential Impact
For European organizations, the impact of CVE-2025-65622 can be significant, particularly for those relying on Snipe-IT for managing IT assets and inventory. Successful exploitation could lead to unauthorized access to user sessions, enabling attackers to impersonate legitimate users and potentially manipulate asset data or gain further foothold within the network. This undermines the confidentiality and integrity of the asset management system, potentially disrupting operational workflows and leading to data breaches. While availability is not directly impacted, the trustworthiness of the system is compromised. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, may face regulatory and reputational consequences if this vulnerability is exploited. The requirement for authentication and user interaction reduces the likelihood of widespread automated attacks but does not eliminate targeted exploitation risks, especially in environments with many users or where user privileges are not tightly controlled.
Mitigation Recommendations
To mitigate CVE-2025-65622, European organizations should immediately upgrade Snipe-IT to version 8.3.4 or later, where the vulnerability has been addressed. In environments where immediate patching is not feasible, implement strict input validation on the 'Country' field to reject or sanitize potentially malicious input. Employ robust output encoding techniques to ensure that any user-supplied data rendered in the browser does not execute as code. Additionally, enforce the principle of least privilege by limiting user permissions to only what is necessary, reducing the risk posed by low-privileged users. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Monitor logs and user activities for unusual behavior that may indicate exploitation attempts. Educate users about the risks of interacting with suspicious content within the application. Finally, conduct regular security assessments and code reviews focusing on input handling and XSS vulnerabilities to prevent similar issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e0bb43937fa579fdf7d55
Added to database: 12/1/2025, 9:42:12 PM
Last enriched: 12/8/2025, 10:08:13 PM
Last updated: 1/16/2026, 3:04:12 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1018: CWE-36 Absolute Path Traversal in Gotac Police Statistics Database System
HighCVE-2025-62582: CWE-306 Missing Authentication for Critical Function in Delta Electronics DIAView
CriticalCVE-2025-62581: CWE-321 Use of Hard-coded Cryptographic Key in Delta Electronics DIAView
CriticalCVE-2025-65118: CWE-427 in AVEVA Process Optimization
HighCVE-2025-65117: CWE-676 in AVEVA Process Optimization
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.