Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68457: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boscop-fr orejime

0
Low
VulnerabilityCVE-2025-68457cvecve-2025-68457cwe-79
Published: Fri Dec 19 2025 (12/19/2025, 16:40:30 UTC)
Source: CVE Database V5
Vendor/Project: boscop-fr
Product: orejime

Description

Orejime is a consent manager that focuses on accessibility. On HTML elements handled by Orejime prior to version 2.3.2, one could run malicious code by embedding `javascript:` code within data attributes. When consenting to the related purpose, Orejime would turn data attributes into unprefixed ones (i.e. `data-href` into `href`), thus executing the code. This shouldn't have any impact on most setups, as elements handled by Orejime are generally hardcoded. The problem would only arise if somebody could inject HTML code within pages. The problem has been patched in version 2.3.2. As a workaround, the problem can be fixed outside of Orejime by sanitizing attributes which could contain executable code.

AI-Powered Analysis

AILast updated: 01/14/2026, 00:39:30 UTC

Technical Analysis

CVE-2025-68457 is a cross-site scripting vulnerability identified in Orejime, a consent management tool developed by boscop-fr that emphasizes accessibility. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Specifically, in Orejime versions before 2.3.2, HTML elements managed by Orejime could be manipulated if an attacker managed to inject malicious HTML containing data attributes with embedded 'javascript:' URIs. When a user consents to the related purpose, Orejime converts these data attributes (e.g., 'data-href') into standard attributes (e.g., 'href'), causing the embedded JavaScript to execute in the user's browser context. This execution can lead to theft of session tokens, unauthorized actions, or other malicious behaviors typical of XSS attacks. However, the exploitability is limited because Orejime elements are generally hardcoded, making HTML injection a prerequisite for exploitation. The vulnerability has been addressed in Orejime version 2.3.2 by preventing such attribute conversion or sanitizing inputs. The CVSS 4.0 score of 0.6 reflects a low severity due to the need for user interaction, lack of authentication requirement, and limited scope of affected systems. No active exploits have been reported. Mitigation outside of updating Orejime includes sanitizing any user-controllable attributes that could be converted into executable attributes to prevent script execution.

Potential Impact

For European organizations, the impact of this vulnerability is generally low but context-dependent. If an organization uses Orejime versions prior to 2.3.2 in web applications that allow user-supplied content or insufficiently sanitized inputs, attackers could exploit this XSS vulnerability to execute malicious scripts in users' browsers. This could lead to session hijacking, unauthorized actions, or phishing attacks targeting users of the affected web applications. However, since Orejime elements are typically hardcoded and the vulnerability requires HTML injection, the attack surface is limited. Organizations with high compliance requirements for user privacy and consent management, such as those in the EU under GDPR, may face reputational damage or regulatory scrutiny if such vulnerabilities are exploited. The low CVSS score indicates limited direct impact on system confidentiality, integrity, or availability, but the risk to user data and trust remains. The absence of known exploits reduces immediate risk but does not eliminate the need for remediation.

Mitigation Recommendations

1. Upgrade Orejime to version 2.3.2 or later immediately to apply the official patch that addresses this vulnerability. 2. Implement strict input validation and sanitization on all user-supplied content, especially any HTML or attributes that could be converted into executable code. Use well-established libraries or frameworks for sanitization that specifically neutralize 'javascript:' URIs and other executable content. 3. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and limit the sources of executable code in the browser context. 4. Conduct regular security code reviews and penetration testing focused on client-side injection vectors in web applications using Orejime. 5. Educate developers and administrators about the risks of improper attribute handling and the importance of sanitizing dynamic content. 6. Monitor web application logs and user reports for signs of suspicious activity or attempted XSS exploitation. 7. If upgrading Orejime is not immediately possible, apply temporary server-side sanitization filters to remove or neutralize potentially dangerous attributes before rendering pages.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-17T20:22:35.081Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694583dbf063e4fadffb1299

Added to database: 12/19/2025, 4:56:59 PM

Last enriched: 1/14/2026, 12:39:30 AM

Last updated: 2/4/2026, 2:46:25 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats