CVE-2025-68457: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boscop-fr orejime
Orejime is a consent manager that focuses on accessibility. On HTML elements handled by Orejime prior to version 2.3.2, one could run malicious code by embedding `javascript:` code within data attributes. When consenting to the related purpose, Orejime would turn data attributes into unprefixed ones (i.e. `data-href` into `href`), thus executing the code. This shouldn't have any impact on most setups, as elements handled by Orejime are generally hardcoded. The problem would only arise if somebody could inject HTML code within pages. The problem has been patched in version 2.3.2. As a workaround, the problem can be fixed outside of Orejime by sanitizing attributes which could contain executable code.
AI Analysis
Technical Summary
CVE-2025-68457 is a cross-site scripting (CWE-79) vulnerability affecting Orejime, a consent management tool designed with accessibility in mind. The vulnerability arises from Orejime's handling of HTML data attributes prior to version 2.3.2. Specifically, if an attacker can inject HTML containing data attributes with embedded javascript: URIs (e.g., data-href="javascript:..."), Orejime's consent processing logic converts these data attributes into standard attributes (e.g., data-href becomes href) when the user consents to a related purpose. This conversion causes the embedded JavaScript code to execute in the victim's browser context. The vulnerability requires that an attacker first be able to inject HTML into the page, which is generally difficult since Orejime elements are typically hardcoded and not user-controllable. The CVSS 4.0 score is 1.7 (low severity), reflecting the limited attack surface and lack of user interaction or privileges required. The vulnerability was publicly disclosed on December 19, 2025, and fixed in Orejime version 2.3.2. No known exploits have been reported in the wild. Mitigation can be achieved by upgrading to 2.3.2 or sanitizing any attributes that could contain executable code outside of Orejime.
Potential Impact
For European organizations, the impact of this vulnerability is generally low due to the requirement for HTML injection, which is typically prevented by secure coding practices and content security policies. However, if an attacker can inject malicious HTML into pages using vulnerable Orejime versions, they could execute arbitrary JavaScript in the context of the affected website, potentially leading to session hijacking, credential theft, or unauthorized actions on behalf of users. This could compromise confidentiality and integrity of user data and reduce trust in the affected service. Organizations handling sensitive user consent data or operating in regulated sectors (e.g., finance, healthcare) should consider the reputational and compliance risks. Since Orejime is a consent manager, improper handling of consent data could also have privacy implications under GDPR if exploited.
Mitigation Recommendations
1. Upgrade Orejime to version 2.3.2 or later, where the vulnerability is patched. 2. Implement strict input validation and sanitization on any user-controllable inputs that could be rendered as HTML attributes, especially those that might be processed by Orejime. 3. Employ Content Security Policy (CSP) headers to restrict execution of inline scripts and javascript: URIs. 4. Conduct code reviews and penetration testing focused on injection points to ensure no HTML injection is possible in pages using Orejime. 5. Monitor for unusual client-side script execution or consent-related anomalies that could indicate exploitation attempts. 6. Educate developers and administrators about the risks of improper attribute handling and the importance of secure consent management configurations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-68457: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boscop-fr orejime
Description
Orejime is a consent manager that focuses on accessibility. On HTML elements handled by Orejime prior to version 2.3.2, one could run malicious code by embedding `javascript:` code within data attributes. When consenting to the related purpose, Orejime would turn data attributes into unprefixed ones (i.e. `data-href` into `href`), thus executing the code. This shouldn't have any impact on most setups, as elements handled by Orejime are generally hardcoded. The problem would only arise if somebody could inject HTML code within pages. The problem has been patched in version 2.3.2. As a workaround, the problem can be fixed outside of Orejime by sanitizing attributes which could contain executable code.
AI-Powered Analysis
Technical Analysis
CVE-2025-68457 is a cross-site scripting (CWE-79) vulnerability affecting Orejime, a consent management tool designed with accessibility in mind. The vulnerability arises from Orejime's handling of HTML data attributes prior to version 2.3.2. Specifically, if an attacker can inject HTML containing data attributes with embedded javascript: URIs (e.g., data-href="javascript:..."), Orejime's consent processing logic converts these data attributes into standard attributes (e.g., data-href becomes href) when the user consents to a related purpose. This conversion causes the embedded JavaScript code to execute in the victim's browser context. The vulnerability requires that an attacker first be able to inject HTML into the page, which is generally difficult since Orejime elements are typically hardcoded and not user-controllable. The CVSS 4.0 score is 1.7 (low severity), reflecting the limited attack surface and lack of user interaction or privileges required. The vulnerability was publicly disclosed on December 19, 2025, and fixed in Orejime version 2.3.2. No known exploits have been reported in the wild. Mitigation can be achieved by upgrading to 2.3.2 or sanitizing any attributes that could contain executable code outside of Orejime.
Potential Impact
For European organizations, the impact of this vulnerability is generally low due to the requirement for HTML injection, which is typically prevented by secure coding practices and content security policies. However, if an attacker can inject malicious HTML into pages using vulnerable Orejime versions, they could execute arbitrary JavaScript in the context of the affected website, potentially leading to session hijacking, credential theft, or unauthorized actions on behalf of users. This could compromise confidentiality and integrity of user data and reduce trust in the affected service. Organizations handling sensitive user consent data or operating in regulated sectors (e.g., finance, healthcare) should consider the reputational and compliance risks. Since Orejime is a consent manager, improper handling of consent data could also have privacy implications under GDPR if exploited.
Mitigation Recommendations
1. Upgrade Orejime to version 2.3.2 or later, where the vulnerability is patched. 2. Implement strict input validation and sanitization on any user-controllable inputs that could be rendered as HTML attributes, especially those that might be processed by Orejime. 3. Employ Content Security Policy (CSP) headers to restrict execution of inline scripts and javascript: URIs. 4. Conduct code reviews and penetration testing focused on injection points to ensure no HTML injection is possible in pages using Orejime. 5. Monitor for unusual client-side script execution or consent-related anomalies that could indicate exploitation attempts. 6. Educate developers and administrators about the risks of improper attribute handling and the importance of secure consent management configurations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-17T20:22:35.081Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694583dbf063e4fadffb1299
Added to database: 12/19/2025, 4:56:59 PM
Last enriched: 12/19/2025, 5:12:23 PM
Last updated: 12/19/2025, 6:06:19 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14958: Heap-based Buffer Overflow in floooh sokol
MediumCVE-2025-68478: CWE-73: External Control of File Name or Path in langflow-ai langflow
HighCVE-2025-68430: CWE-24: Path Traversal: '../filedir' in cvat-ai cvat
MediumCVE-2025-63665: n/a
UnknownCVE-2025-14957: NULL Pointer Dereference in WebAssembly Binaryen
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.