Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66574: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Compass Plustechologies TranzAxis

0
Medium
VulnerabilityCVE-2025-66574cvecve-2025-66574cwe-79
Published: Thu Dec 04 2025 (12/04/2025, 20:45:44 UTC)
Source: CVE Database V5
Vendor/Project: Compass Plustechologies
Product: TranzAxis

Description

TranzAxis 3.2.41.10.26 allows authenticated users to inject cross-site scripting via the `Open Object in Tree` endpoint, allowing attackers to steal session cookies and potentially escalate privileges.

AI-Powered Analysis

AILast updated: 12/04/2025, 21:11:49 UTC

Technical Analysis

CVE-2025-66574 identifies a cross-site scripting (XSS) vulnerability in Compass Plustechologies' TranzAxis software, specifically version 3.2.41.10.26. The vulnerability is categorized under CWE-79, which involves improper neutralization of input during web page generation. The flaw exists in the 'Open Object in Tree' endpoint, where authenticated users can inject malicious JavaScript code. This injected script can execute in the context of other users' browsers, enabling attackers to steal session cookies, hijack sessions, and potentially escalate privileges within the application. The vulnerability does not require user interaction, and no authentication beyond standard user login is needed, making it easier to exploit internally or by compromised users. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required beyond user privileges (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:N). Although no public exploits are reported, the vulnerability poses a moderate risk due to the potential for session hijacking and privilege escalation. The lack of a patch at the time of publication necessitates immediate mitigation through compensating controls. The vulnerability affects only the specified version, so organizations running other versions may not be impacted. The root cause is insufficient input sanitization and output encoding in the web interface, allowing script injection during page rendering.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized access to sensitive systems through session hijacking and privilege escalation. Sectors such as finance, manufacturing, and critical infrastructure that rely on TranzAxis for operational or transactional processes could face data breaches, operational disruptions, or compliance violations under GDPR. The ability for an authenticated user to exploit this flaw means insider threats or compromised accounts can be leveraged to escalate attacks. The medium CVSS score reflects moderate risk, but the impact could be significant if attackers gain administrative privileges or access to confidential data. The vulnerability could also undermine trust in affected organizations if exploited, leading to reputational damage. Since TranzAxis is a specialized product, the impact is concentrated among organizations using this software, but those affected may face regulatory scrutiny and financial losses.

Mitigation Recommendations

1. Immediately restrict access to the 'Open Object in Tree' endpoint to trusted users and networks using firewall rules or application-layer access controls. 2. Implement strict input validation and output encoding on all user-supplied data within the TranzAxis web interface to prevent script injection. 3. Monitor logs for unusual activity related to the vulnerable endpoint, including repeated access or suspicious payloads. 4. Enforce multi-factor authentication (MFA) for all users to reduce the risk of compromised credentials being used to exploit the vulnerability. 5. Segregate user roles and apply the principle of least privilege to limit the potential impact of an exploited account. 6. Prepare to apply vendor patches promptly once released; maintain communication with Compass Plustechologies for updates. 7. Conduct security awareness training to inform users about the risks of XSS and safe browsing practices within internal applications. 8. Consider deploying web application firewalls (WAF) with custom rules to detect and block XSS payloads targeting the vulnerable endpoint.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-04T16:24:10.581Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6931f4df0459f550ecf89e0b

Added to database: 12/4/2025, 8:53:51 PM

Last enriched: 12/4/2025, 9:11:49 PM

Last updated: 12/5/2025, 2:17:37 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats