CVE-2025-65892: n/a
Reflected Cross-Site Scripting (rXSS) in krpano before version 1.23.2 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the victim's browser via a crafted URL to the passQueryParameters function with the xml parameter enabled.
AI Analysis
Technical Summary
CVE-2025-65892 is a reflected Cross-Site Scripting vulnerability identified in krpano, a software platform widely used for creating interactive panoramic images and virtual tours. The flaw exists in versions before 1.23.2 within the passQueryParameters function when the xml parameter is enabled. An attacker can craft a specially designed URL that, when visited by a victim, causes the victim's browser to execute arbitrary JavaScript code. This type of vulnerability is classified under CWE-79, indicating improper neutralization of input leading to script injection. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact affects confidentiality and integrity partially (C:L/I:L) but does not impact availability (A:N). Since krpano is often embedded in websites or applications delivering panoramic content, this vulnerability could be exploited to steal session cookies, perform phishing, or manipulate displayed content, potentially compromising user data or trust. No patches are linked yet, but upgrading to version 1.23.2 or later is recommended once available. No known exploits have been reported in the wild, but the medium CVSS score indicates a moderate risk that should be addressed proactively.
Potential Impact
For European organizations, especially those in digital media, tourism, real estate, and education sectors that utilize krpano for immersive content, this vulnerability poses a risk of client-side script injection leading to session hijacking, credential theft, or phishing attacks. The reflected XSS can undermine user trust and potentially expose sensitive user data or enable further attacks via the victim’s browser. Although it does not directly impact system availability, the compromise of user confidentiality and integrity can have reputational and regulatory consequences, particularly under GDPR. Organizations relying on krpano embedded in customer-facing portals or internal tools should consider the risk of targeted phishing campaigns exploiting this vulnerability. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed rapidly once details are public.
Mitigation Recommendations
Organizations should immediately verify if they use krpano versions prior to 1.23.2 and plan to upgrade to version 1.23.2 or later once available. Until a patch is applied, implement strict input validation and output encoding on any user-controllable parameters passed to krpano, especially the xml parameter in passQueryParameters. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Educate users about the risks of clicking untrusted links and monitor web traffic for suspicious URL patterns targeting krpano components. Web application firewalls (WAFs) can be tuned to detect and block reflected XSS attempts targeting this vulnerability. Additionally, review and limit the exposure of krpano interfaces to only trusted users or networks where feasible. Regularly audit and test web applications embedding krpano to detect any residual XSS risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-65892: n/a
Description
Reflected Cross-Site Scripting (rXSS) in krpano before version 1.23.2 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the victim's browser via a crafted URL to the passQueryParameters function with the xml parameter enabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-65892 is a reflected Cross-Site Scripting vulnerability identified in krpano, a software platform widely used for creating interactive panoramic images and virtual tours. The flaw exists in versions before 1.23.2 within the passQueryParameters function when the xml parameter is enabled. An attacker can craft a specially designed URL that, when visited by a victim, causes the victim's browser to execute arbitrary JavaScript code. This type of vulnerability is classified under CWE-79, indicating improper neutralization of input leading to script injection. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact affects confidentiality and integrity partially (C:L/I:L) but does not impact availability (A:N). Since krpano is often embedded in websites or applications delivering panoramic content, this vulnerability could be exploited to steal session cookies, perform phishing, or manipulate displayed content, potentially compromising user data or trust. No patches are linked yet, but upgrading to version 1.23.2 or later is recommended once available. No known exploits have been reported in the wild, but the medium CVSS score indicates a moderate risk that should be addressed proactively.
Potential Impact
For European organizations, especially those in digital media, tourism, real estate, and education sectors that utilize krpano for immersive content, this vulnerability poses a risk of client-side script injection leading to session hijacking, credential theft, or phishing attacks. The reflected XSS can undermine user trust and potentially expose sensitive user data or enable further attacks via the victim’s browser. Although it does not directly impact system availability, the compromise of user confidentiality and integrity can have reputational and regulatory consequences, particularly under GDPR. Organizations relying on krpano embedded in customer-facing portals or internal tools should consider the risk of targeted phishing campaigns exploiting this vulnerability. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed rapidly once details are public.
Mitigation Recommendations
Organizations should immediately verify if they use krpano versions prior to 1.23.2 and plan to upgrade to version 1.23.2 or later once available. Until a patch is applied, implement strict input validation and output encoding on any user-controllable parameters passed to krpano, especially the xml parameter in passQueryParameters. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Educate users about the risks of clicking untrusted links and monitor web traffic for suspicious URL patterns targeting krpano components. Web application firewalls (WAFs) can be tuned to detect and block reflected XSS attempts targeting this vulnerability. Additionally, review and limit the exposure of krpano interfaces to only trusted users or networks where feasible. Regularly audit and test web applications embedding krpano to detect any residual XSS risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692a6e062a13ea799fea6fbf
Added to database: 11/29/2025, 3:52:38 AM
Last enriched: 12/6/2025, 4:33:07 AM
Last updated: 1/13/2026, 5:38:43 PM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
GoBruteforcer Botnet Targeting Crypto, Blockchain Projects
MediumMalicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
MediumCyber Insights 2026: External Attack Surface Management
MediumCVE-2025-8090: CWE-476 NULL Pointer Dereference in BlackBerry Ltd QNX Software Development Platform
MediumCVE-2025-68707: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.