CVE-2025-68457: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boscop-fr orejime
Orejime is a consent manager that focuses on accessibility. On HTML elements handled by Orejime prior to version 2.3.2, one could run malicious code by embedding `javascript:` code within data attributes. When consenting to the related purpose, Orejime would turn data attributes into unprefixed ones (i.e. `data-href` into `href`), thus executing the code. This shouldn't have any impact on most setups, as elements handled by Orejime are generally hardcoded. The problem would only arise if somebody could inject HTML code within pages. The problem has been patched in version 2.3.2. As a workaround, the problem can be fixed outside of Orejime by sanitizing attributes which could contain executable code.
AI Analysis
Technical Summary
CVE-2025-68457 is a cross-site scripting vulnerability identified in Orejime, a consent management tool developed by boscop-fr that emphasizes accessibility. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Specifically, in Orejime versions before 2.3.2, HTML elements managed by Orejime could be manipulated if an attacker managed to inject malicious HTML containing data attributes with embedded 'javascript:' URIs. When a user consents to the related purpose, Orejime converts these data attributes (e.g., 'data-href') into standard attributes (e.g., 'href'), causing the embedded JavaScript to execute in the user's browser context. This execution can lead to theft of session tokens, unauthorized actions, or other malicious behaviors typical of XSS attacks. However, the exploitability is limited because Orejime elements are generally hardcoded, making HTML injection a prerequisite for exploitation. The vulnerability has been addressed in Orejime version 2.3.2 by preventing such attribute conversion or sanitizing inputs. The CVSS 4.0 score of 0.6 reflects a low severity due to the need for user interaction, lack of authentication requirement, and limited scope of affected systems. No active exploits have been reported. Mitigation outside of updating Orejime includes sanitizing any user-controllable attributes that could be converted into executable attributes to prevent script execution.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but context-dependent. If an organization uses Orejime versions prior to 2.3.2 in web applications that allow user-supplied content or insufficiently sanitized inputs, attackers could exploit this XSS vulnerability to execute malicious scripts in users' browsers. This could lead to session hijacking, unauthorized actions, or phishing attacks targeting users of the affected web applications. However, since Orejime elements are typically hardcoded and the vulnerability requires HTML injection, the attack surface is limited. Organizations with high compliance requirements for user privacy and consent management, such as those in the EU under GDPR, may face reputational damage or regulatory scrutiny if such vulnerabilities are exploited. The low CVSS score indicates limited direct impact on system confidentiality, integrity, or availability, but the risk to user data and trust remains. The absence of known exploits reduces immediate risk but does not eliminate the need for remediation.
Mitigation Recommendations
1. Upgrade Orejime to version 2.3.2 or later immediately to apply the official patch that addresses this vulnerability. 2. Implement strict input validation and sanitization on all user-supplied content, especially any HTML or attributes that could be converted into executable code. Use well-established libraries or frameworks for sanitization that specifically neutralize 'javascript:' URIs and other executable content. 3. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and limit the sources of executable code in the browser context. 4. Conduct regular security code reviews and penetration testing focused on client-side injection vectors in web applications using Orejime. 5. Educate developers and administrators about the risks of improper attribute handling and the importance of sanitizing dynamic content. 6. Monitor web application logs and user reports for signs of suspicious activity or attempted XSS exploitation. 7. If upgrading Orejime is not immediately possible, apply temporary server-side sanitization filters to remove or neutralize potentially dangerous attributes before rendering pages.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-68457: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boscop-fr orejime
Description
Orejime is a consent manager that focuses on accessibility. On HTML elements handled by Orejime prior to version 2.3.2, one could run malicious code by embedding `javascript:` code within data attributes. When consenting to the related purpose, Orejime would turn data attributes into unprefixed ones (i.e. `data-href` into `href`), thus executing the code. This shouldn't have any impact on most setups, as elements handled by Orejime are generally hardcoded. The problem would only arise if somebody could inject HTML code within pages. The problem has been patched in version 2.3.2. As a workaround, the problem can be fixed outside of Orejime by sanitizing attributes which could contain executable code.
AI-Powered Analysis
Technical Analysis
CVE-2025-68457 is a cross-site scripting vulnerability identified in Orejime, a consent management tool developed by boscop-fr that emphasizes accessibility. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Specifically, in Orejime versions before 2.3.2, HTML elements managed by Orejime could be manipulated if an attacker managed to inject malicious HTML containing data attributes with embedded 'javascript:' URIs. When a user consents to the related purpose, Orejime converts these data attributes (e.g., 'data-href') into standard attributes (e.g., 'href'), causing the embedded JavaScript to execute in the user's browser context. This execution can lead to theft of session tokens, unauthorized actions, or other malicious behaviors typical of XSS attacks. However, the exploitability is limited because Orejime elements are generally hardcoded, making HTML injection a prerequisite for exploitation. The vulnerability has been addressed in Orejime version 2.3.2 by preventing such attribute conversion or sanitizing inputs. The CVSS 4.0 score of 0.6 reflects a low severity due to the need for user interaction, lack of authentication requirement, and limited scope of affected systems. No active exploits have been reported. Mitigation outside of updating Orejime includes sanitizing any user-controllable attributes that could be converted into executable attributes to prevent script execution.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but context-dependent. If an organization uses Orejime versions prior to 2.3.2 in web applications that allow user-supplied content or insufficiently sanitized inputs, attackers could exploit this XSS vulnerability to execute malicious scripts in users' browsers. This could lead to session hijacking, unauthorized actions, or phishing attacks targeting users of the affected web applications. However, since Orejime elements are typically hardcoded and the vulnerability requires HTML injection, the attack surface is limited. Organizations with high compliance requirements for user privacy and consent management, such as those in the EU under GDPR, may face reputational damage or regulatory scrutiny if such vulnerabilities are exploited. The low CVSS score indicates limited direct impact on system confidentiality, integrity, or availability, but the risk to user data and trust remains. The absence of known exploits reduces immediate risk but does not eliminate the need for remediation.
Mitigation Recommendations
1. Upgrade Orejime to version 2.3.2 or later immediately to apply the official patch that addresses this vulnerability. 2. Implement strict input validation and sanitization on all user-supplied content, especially any HTML or attributes that could be converted into executable code. Use well-established libraries or frameworks for sanitization that specifically neutralize 'javascript:' URIs and other executable content. 3. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and limit the sources of executable code in the browser context. 4. Conduct regular security code reviews and penetration testing focused on client-side injection vectors in web applications using Orejime. 5. Educate developers and administrators about the risks of improper attribute handling and the importance of sanitizing dynamic content. 6. Monitor web application logs and user reports for signs of suspicious activity or attempted XSS exploitation. 7. If upgrading Orejime is not immediately possible, apply temporary server-side sanitization filters to remove or neutralize potentially dangerous attributes before rendering pages.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-17T20:22:35.081Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694583dbf063e4fadffb1299
Added to database: 12/19/2025, 4:56:59 PM
Last enriched: 1/14/2026, 12:39:30 AM
Last updated: 2/4/2026, 2:46:25 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-69618: n/a
UnknownCVE-2024-45326: Improper access control in Fortinet FortiDeceptor
LowCVE-2025-14740: CWE-732 Incorrect Permission Assignment for Critical Resource in Docker Inc. Docker Desktop
MediumCVE-2024-35280: Execute unauthorized code or commands in Fortinet FortiDeceptor
MediumCVE-2025-5329: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Martcode Software Inc. Delta Course Automation
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.