Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68457: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boscop-fr orejime

0
Low
VulnerabilityCVE-2025-68457cvecve-2025-68457cwe-79
Published: Fri Dec 19 2025 (12/19/2025, 16:40:30 UTC)
Source: CVE Database V5
Vendor/Project: boscop-fr
Product: orejime

Description

Orejime is a consent manager that focuses on accessibility. On HTML elements handled by Orejime prior to version 2.3.2, one could run malicious code by embedding `javascript:` code within data attributes. When consenting to the related purpose, Orejime would turn data attributes into unprefixed ones (i.e. `data-href` into `href`), thus executing the code. This shouldn't have any impact on most setups, as elements handled by Orejime are generally hardcoded. The problem would only arise if somebody could inject HTML code within pages. The problem has been patched in version 2.3.2. As a workaround, the problem can be fixed outside of Orejime by sanitizing attributes which could contain executable code.

AI-Powered Analysis

AILast updated: 12/19/2025, 17:12:23 UTC

Technical Analysis

CVE-2025-68457 is a cross-site scripting (CWE-79) vulnerability affecting Orejime, a consent management tool designed with accessibility in mind. The vulnerability arises from Orejime's handling of HTML data attributes prior to version 2.3.2. Specifically, if an attacker can inject HTML containing data attributes with embedded javascript: URIs (e.g., data-href="javascript:..."), Orejime's consent processing logic converts these data attributes into standard attributes (e.g., data-href becomes href) when the user consents to a related purpose. This conversion causes the embedded JavaScript code to execute in the victim's browser context. The vulnerability requires that an attacker first be able to inject HTML into the page, which is generally difficult since Orejime elements are typically hardcoded and not user-controllable. The CVSS 4.0 score is 1.7 (low severity), reflecting the limited attack surface and lack of user interaction or privileges required. The vulnerability was publicly disclosed on December 19, 2025, and fixed in Orejime version 2.3.2. No known exploits have been reported in the wild. Mitigation can be achieved by upgrading to 2.3.2 or sanitizing any attributes that could contain executable code outside of Orejime.

Potential Impact

For European organizations, the impact of this vulnerability is generally low due to the requirement for HTML injection, which is typically prevented by secure coding practices and content security policies. However, if an attacker can inject malicious HTML into pages using vulnerable Orejime versions, they could execute arbitrary JavaScript in the context of the affected website, potentially leading to session hijacking, credential theft, or unauthorized actions on behalf of users. This could compromise confidentiality and integrity of user data and reduce trust in the affected service. Organizations handling sensitive user consent data or operating in regulated sectors (e.g., finance, healthcare) should consider the reputational and compliance risks. Since Orejime is a consent manager, improper handling of consent data could also have privacy implications under GDPR if exploited.

Mitigation Recommendations

1. Upgrade Orejime to version 2.3.2 or later, where the vulnerability is patched. 2. Implement strict input validation and sanitization on any user-controllable inputs that could be rendered as HTML attributes, especially those that might be processed by Orejime. 3. Employ Content Security Policy (CSP) headers to restrict execution of inline scripts and javascript: URIs. 4. Conduct code reviews and penetration testing focused on injection points to ensure no HTML injection is possible in pages using Orejime. 5. Monitor for unusual client-side script execution or consent-related anomalies that could indicate exploitation attempts. 6. Educate developers and administrators about the risks of improper attribute handling and the importance of secure consent management configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-17T20:22:35.081Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694583dbf063e4fadffb1299

Added to database: 12/19/2025, 4:56:59 PM

Last enriched: 12/19/2025, 5:12:23 PM

Last updated: 12/19/2025, 6:06:19 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats