Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7760: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ofisimo Web-Based Software Technologies Association Web Package Flora

0
High
VulnerabilityCVE-2025-7760cvecve-2025-7760cwe-79
Published: Tue Feb 03 2026 (02/03/2026, 12:33:23 UTC)
Source: CVE Database V5
Vendor/Project: Ofisimo Web-Based Software Technologies
Product: Association Web Package Flora

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers.This issue affects Association Web Package Flora: from v3.0 through 03022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 00:23:48 UTC

Technical Analysis

CVE-2025-7760 identifies a Cross-site Scripting (XSS) vulnerability classified under CWE-79 in the Ofisimo Web-Based Software Technologies Association Web Package Flora, versions 3.0 through 03022026. This vulnerability stems from improper neutralization of input during web page generation, specifically through HTTP headers, which are not adequately sanitized or encoded before being reflected in the web application's output. As a result, an attacker with low privileges (PR:L) can craft malicious HTTP headers that inject executable scripts into the victim's browser context without requiring any user interaction (UI:N). The vulnerability has a CVSS 3.1 base score of 7.6, indicating high severity, with network attack vector (AV:N), low attack complexity (AC:L), and impacts on confidentiality (C:L), integrity (I:L), and availability (A:H). The high availability impact suggests that exploitation could disrupt service, potentially through script-based denial of service or manipulation of application behavior. The vendor was contacted early but did not respond or provide a patch, leaving the vulnerability unmitigated. No known exploits have been reported in the wild yet, but the nature of XSS vulnerabilities makes exploitation feasible in many scenarios, especially in environments where the software is exposed to untrusted users or external networks. The vulnerability affects web-based association management platforms, which are often used by organizations to manage memberships, events, and communications, making the risk significant for entities relying on this software for critical operations.

Potential Impact

The impact of CVE-2025-7760 on organizations worldwide can be substantial. Successful exploitation allows attackers to execute arbitrary scripts in the context of the vulnerable web application, potentially leading to session hijacking, credential theft, unauthorized actions on behalf of users, and defacement or disruption of services. The high availability impact indicates that attackers might also cause denial of service conditions, affecting the availability of association management services. Organizations using the affected software may face data breaches, loss of user trust, and operational interruptions. Since the vulnerability can be exploited remotely over the network without user interaction, the attack surface is broad, increasing the likelihood of exploitation in environments exposed to the internet. The lack of vendor response and patches exacerbates the risk, forcing organizations to rely on compensating controls. Industries relying on association management platforms, including professional associations, educational institutions, and non-profits, are particularly vulnerable. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within organizational networks.

Mitigation Recommendations

To mitigate CVE-2025-7760 effectively, organizations should implement multiple layers of defense: 1) Apply strict input validation and output encoding for all HTTP headers to neutralize malicious scripts before rendering. Since no official patch is available, organizations may need to modify application code or use custom middleware to sanitize headers. 2) Deploy Web Application Firewalls (WAFs) with tailored rules to detect and block suspicious HTTP header content indicative of XSS payloads. 3) Conduct regular security assessments and penetration testing focused on HTTP header injection vectors to identify and remediate weaknesses. 4) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, limiting the impact of potential XSS attacks. 5) Monitor logs and network traffic for anomalous header patterns or repeated injection attempts. 6) Educate developers and administrators about secure coding practices related to input handling and output encoding. 7) Isolate the vulnerable application in network segments with limited access to reduce potential lateral movement if exploited. 8) Prepare incident response plans specifically addressing XSS exploitation scenarios. These targeted measures go beyond generic advice by focusing on HTTP header sanitization and compensating controls in the absence of vendor patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-07-17T13:37:17.357Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6981edd5f9fa50a62fc5ae12

Added to database: 2/3/2026, 12:45:09 PM

Last enriched: 3/26/2026, 12:23:48 AM

Last updated: 5/3/2026, 6:54:49 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses