Skip to main content

CVE-2025-7761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Akcess-Net Lepszy BIP

Medium
VulnerabilityCVE-2025-7761cvecve-2025-7761cwe-79
Published: Thu Aug 14 2025 (08/14/2025, 10:01:38 UTC)
Source: CVE Database V5
Vendor/Project: Akcess-Net
Product: Lepszy BIP

Description

Lepszy BIP is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in index.php form in one of the parameters allows arbitrary JavaScript to be executed on victim's browser when specially crafted URL is opened. The vendor was contacted early about this disclosure but did not respond in any way. Potentially all versions are vulnerable.

AI-Powered Analysis

AILast updated: 08/14/2025, 10:32:58 UTC

Technical Analysis

CVE-2025-7761 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Akcess-Net product Lepszy BIP, specifically affecting the index.php form parameter. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an attacker to craft a malicious URL containing arbitrary JavaScript code. When a victim opens this specially crafted URL, the injected script executes in their browser context. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. The vulnerability requires no authentication and can be exploited remotely over the network with low attack complexity. The vendor was notified but has not responded or provided any patch, and potentially all versions of Lepszy BIP are affected. The CVSS v4.0 base score is 5.1 (medium severity), reflecting network attack vector, no privileges required, no user interaction needed beyond clicking a malicious link, and limited scope impact confined to the vulnerable web application. No known exploits are currently reported in the wild. The vulnerability is significant because Lepszy BIP is used for public information bulletin systems, which may contain sensitive or official information, making the integrity and trustworthiness of displayed content critical.

Potential Impact

For European organizations, particularly public sector entities using Lepszy BIP for disseminating official information, this vulnerability poses risks to the confidentiality and integrity of user sessions and data. Attackers could exploit the XSS flaw to steal cookies or tokens, impersonate users, or manipulate displayed content, undermining public trust and potentially leading to misinformation or phishing attacks targeting citizens or employees. The reflected nature of the XSS means attacks rely on social engineering (e.g., convincing users to click malicious links), which can be effective in targeted campaigns. Additionally, compromised browsers could be used as a pivot point for further attacks within organizational networks. Given the lack of vendor response and patch, affected organizations face prolonged exposure, increasing the risk of exploitation over time.

Mitigation Recommendations

Organizations should implement immediate compensating controls such as deploying Web Application Firewalls (WAFs) with rules to detect and block malicious input patterns targeting the vulnerable parameter in index.php. Input validation and output encoding should be enforced at the application layer to sanitize user-supplied data, ideally by modifying the source code to properly neutralize inputs before rendering. If source code modification is not feasible, organizations can implement content security policies (CSP) to restrict script execution contexts and reduce the impact of injected scripts. User awareness campaigns should educate users about the risks of clicking suspicious links. Monitoring web server logs for unusual query parameters and anomalous traffic patterns can help detect attempted exploitation. Finally, organizations should engage with the vendor or consider migrating to alternative solutions if no patch is forthcoming.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-07-17T14:06:46.777Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689db7cfad5a09ad00599b62

Added to database: 8/14/2025, 10:17:51 AM

Last enriched: 8/14/2025, 10:32:58 AM

Last updated: 8/15/2025, 12:34:50 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats