CVE-2025-70368: n/a
CVE-2025-70368 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability found in Worklenz version 2. 1. 5, specifically in the Project Updates feature. An attacker can inject malicious JavaScript payloads into the Updates text field, which are then rendered unsanitized in the reporting view. This can lead to script execution in the browsers of users who view the affected page, potentially compromising confidentiality and integrity. Exploitation requires the attacker to have limited privileges and user interaction, as victims must visit the maliciously crafted page. No known exploits are currently reported in the wild. European organizations using Worklenz 2. 1. 5 should prioritize patching or applying mitigations to prevent potential exploitation.
AI Analysis
Technical Summary
CVE-2025-70368 is a Stored Cross-Site Scripting (XSS) vulnerability affecting Worklenz version 2.1.5, a project management tool. The vulnerability resides in the Project Updates feature, where user-submitted content in the Updates text field is not properly sanitized before being displayed in the reporting view. This lack of input validation allows attackers to inject malicious JavaScript code that executes in the context of other users' browsers when they access the affected page. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires limited privileges, and user interaction is necessary. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity but not availability. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. Stored XSS can be leveraged for session hijacking, credential theft, or delivering further attacks such as phishing or malware distribution within an organization.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive information and manipulation of data integrity through malicious script execution in users’ browsers. This is particularly concerning for organizations relying on Worklenz for project management and reporting, as attackers could hijack sessions, steal credentials, or perform actions on behalf of legitimate users. The requirement for limited privileges and user interaction reduces the ease of exploitation but does not eliminate risk, especially in environments with many users accessing project updates. The vulnerability could facilitate lateral movement or persistent footholds in corporate networks if combined with social engineering. Confidentiality breaches may expose sensitive project data, impacting competitive advantage and compliance with data protection regulations such as GDPR. Integrity impacts could undermine trust in project reporting and decision-making processes. Availability is not directly affected, but indirect effects could arise from follow-on attacks.
Mitigation Recommendations
To mitigate CVE-2025-70368, organizations should first verify if they are running Worklenz version 2.1.5 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement strict input validation and output encoding on the Updates text field to sanitize user input and prevent script injection. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. Educate users to be cautious when clicking links or viewing project updates, especially from untrusted sources. Limit privileges of users who can submit updates to reduce the attack surface. Monitor logs and user activity for suspicious behavior indicative of exploitation attempts. Consider deploying web application firewalls (WAFs) with rules targeting XSS payloads in the affected endpoints. Regularly review and update security policies related to web application usage and user-generated content. Coordinate with Worklenz vendor support for timely updates and advisories.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-70368: n/a
Description
CVE-2025-70368 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability found in Worklenz version 2. 1. 5, specifically in the Project Updates feature. An attacker can inject malicious JavaScript payloads into the Updates text field, which are then rendered unsanitized in the reporting view. This can lead to script execution in the browsers of users who view the affected page, potentially compromising confidentiality and integrity. Exploitation requires the attacker to have limited privileges and user interaction, as victims must visit the maliciously crafted page. No known exploits are currently reported in the wild. European organizations using Worklenz 2. 1. 5 should prioritize patching or applying mitigations to prevent potential exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-70368 is a Stored Cross-Site Scripting (XSS) vulnerability affecting Worklenz version 2.1.5, a project management tool. The vulnerability resides in the Project Updates feature, where user-submitted content in the Updates text field is not properly sanitized before being displayed in the reporting view. This lack of input validation allows attackers to inject malicious JavaScript code that executes in the context of other users' browsers when they access the affected page. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires limited privileges, and user interaction is necessary. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity but not availability. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. Stored XSS can be leveraged for session hijacking, credential theft, or delivering further attacks such as phishing or malware distribution within an organization.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive information and manipulation of data integrity through malicious script execution in users’ browsers. This is particularly concerning for organizations relying on Worklenz for project management and reporting, as attackers could hijack sessions, steal credentials, or perform actions on behalf of legitimate users. The requirement for limited privileges and user interaction reduces the ease of exploitation but does not eliminate risk, especially in environments with many users accessing project updates. The vulnerability could facilitate lateral movement or persistent footholds in corporate networks if combined with social engineering. Confidentiality breaches may expose sensitive project data, impacting competitive advantage and compliance with data protection regulations such as GDPR. Integrity impacts could undermine trust in project reporting and decision-making processes. Availability is not directly affected, but indirect effects could arise from follow-on attacks.
Mitigation Recommendations
To mitigate CVE-2025-70368, organizations should first verify if they are running Worklenz version 2.1.5 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement strict input validation and output encoding on the Updates text field to sanitize user input and prevent script injection. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. Educate users to be cautious when clicking links or viewing project updates, especially from untrusted sources. Limit privileges of users who can submit updates to reduce the attack surface. Monitor logs and user activity for suspicious behavior indicative of exploitation attempts. Consider deploying web application firewalls (WAFs) with rules targeting XSS payloads in the affected endpoints. Regularly review and update security policies related to web application usage and user-generated content. Coordinate with Worklenz vendor support for timely updates and advisories.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6977bbea4623b1157cb50af7
Added to database: 1/26/2026, 7:09:30 PM
Last enriched: 2/3/2026, 8:40:25 AM
Last updated: 2/7/2026, 1:17:09 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.