Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70368: n/a

0
Medium
VulnerabilityCVE-2025-70368cvecve-2025-70368
Published: Mon Jan 26 2026 (01/26/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-70368 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability found in Worklenz version 2. 1. 5, specifically in the Project Updates feature. An attacker can inject malicious JavaScript payloads into the Updates text field, which are then rendered unsanitized in the reporting view. This can lead to script execution in the browsers of users who view the affected page, potentially compromising confidentiality and integrity. Exploitation requires the attacker to have limited privileges and user interaction, as victims must visit the maliciously crafted page. No known exploits are currently reported in the wild. European organizations using Worklenz 2. 1. 5 should prioritize patching or applying mitigations to prevent potential exploitation.

AI-Powered Analysis

AILast updated: 02/03/2026, 08:40:25 UTC

Technical Analysis

CVE-2025-70368 is a Stored Cross-Site Scripting (XSS) vulnerability affecting Worklenz version 2.1.5, a project management tool. The vulnerability resides in the Project Updates feature, where user-submitted content in the Updates text field is not properly sanitized before being displayed in the reporting view. This lack of input validation allows attackers to inject malicious JavaScript code that executes in the context of other users' browsers when they access the affected page. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires limited privileges, and user interaction is necessary. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity but not availability. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. Stored XSS can be leveraged for session hijacking, credential theft, or delivering further attacks such as phishing or malware distribution within an organization.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive information and manipulation of data integrity through malicious script execution in users’ browsers. This is particularly concerning for organizations relying on Worklenz for project management and reporting, as attackers could hijack sessions, steal credentials, or perform actions on behalf of legitimate users. The requirement for limited privileges and user interaction reduces the ease of exploitation but does not eliminate risk, especially in environments with many users accessing project updates. The vulnerability could facilitate lateral movement or persistent footholds in corporate networks if combined with social engineering. Confidentiality breaches may expose sensitive project data, impacting competitive advantage and compliance with data protection regulations such as GDPR. Integrity impacts could undermine trust in project reporting and decision-making processes. Availability is not directly affected, but indirect effects could arise from follow-on attacks.

Mitigation Recommendations

To mitigate CVE-2025-70368, organizations should first verify if they are running Worklenz version 2.1.5 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement strict input validation and output encoding on the Updates text field to sanitize user input and prevent script injection. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. Educate users to be cautious when clicking links or viewing project updates, especially from untrusted sources. Limit privileges of users who can submit updates to reduce the attack surface. Monitor logs and user activity for suspicious behavior indicative of exploitation attempts. Consider deploying web application firewalls (WAFs) with rules targeting XSS payloads in the affected endpoints. Regularly review and update security policies related to web application usage and user-generated content. Coordinate with Worklenz vendor support for timely updates and advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6977bbea4623b1157cb50af7

Added to database: 1/26/2026, 7:09:30 PM

Last enriched: 2/3/2026, 8:40:25 AM

Last updated: 2/7/2026, 7:04:17 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats