Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7760: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ofisimo Web-Based Software Technologies Association Web Package Flora

0
High
VulnerabilityCVE-2025-7760cvecve-2025-7760cwe-79
Published: Tue Feb 03 2026 (02/03/2026, 12:33:23 UTC)
Source: CVE Database V5
Vendor/Project: Ofisimo Web-Based Software Technologies
Product: Association Web Package Flora

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web Package Flora: from v3.0 through 03022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/03/2026, 12:59:31 UTC

Technical Analysis

CVE-2025-7760 identifies a Cross-site Scripting (XSS) vulnerability classified under CWE-79 in the Ofisimo Web-Based Software Technologies' Association Web Package Flora, specifically versions 3.0 through 03022026. The vulnerability stems from improper neutralization of input during web page generation, allowing malicious scripts to be injected via HTTP headers. This type of XSS occurs when user-controllable data in HTTP headers is not correctly sanitized or encoded before being reflected in web pages, enabling attackers to execute arbitrary JavaScript in the context of the victim's browser. The CVSS 3.1 score of 7.6 indicates a high-severity issue with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), and impacting confidentiality, integrity, and availability. The vulnerability can be exploited remotely by an attacker with low privileges on the network, potentially leading to session hijacking, data leakage, or denial of service through crafted HTTP headers. The vendor has not responded to early disclosure attempts, and no patches or mitigations have been published, increasing the risk window. The lack of known exploits in the wild currently suggests limited active exploitation, but the vulnerability's nature and severity warrant immediate defensive measures. The issue affects web applications deployed with this software, which may be used by organizations for association management and related web services.

Potential Impact

For European organizations using the Association Web Package Flora, this vulnerability poses significant risks. Exploitation could lead to unauthorized disclosure of sensitive information, including session tokens or personal data, compromising confidentiality. Integrity may be affected as attackers could manipulate web content or perform actions on behalf of authenticated users. Availability impact is rated high, as attackers might disrupt services by injecting malicious scripts that cause application errors or crashes. Given the web-based nature of the software, public-facing services are particularly vulnerable, potentially affecting member associations, NGOs, or other entities relying on this platform. The absence of vendor patches increases exposure duration, elevating the risk of targeted attacks. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection; exploitation leading to data breaches could result in legal and financial penalties for affected organizations. The vulnerability's exploitation ease and network accessibility make it a credible threat to European entities with deployments of this software.

Mitigation Recommendations

Since no official patches are available, European organizations should implement immediate compensating controls. First, enforce strict input validation and output encoding on all HTTP headers processed by the application to neutralize malicious scripts. Employ Web Application Firewalls (WAFs) configured with custom rules to detect and block suspicious HTTP header content indicative of XSS attempts. Conduct thorough code reviews and security testing focusing on header handling routines. Limit privileges of users and services interacting with the web application to reduce exploitation scope. Monitor web server and application logs for anomalous header values or repeated injection attempts. Consider isolating the affected application behind reverse proxies that can sanitize headers. Engage with Ofisimo or community forums to track any forthcoming patches or advisories. Finally, educate administrators and developers about secure coding practices related to header processing to prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-07-17T13:37:17.357Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6981edd5f9fa50a62fc5ae12

Added to database: 2/3/2026, 12:45:09 PM

Last enriched: 2/3/2026, 12:59:31 PM

Last updated: 2/3/2026, 3:02:07 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats