Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9158: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Best Practical Request Tracker

0
Medium
VulnerabilityCVE-2025-9158cvecve-2025-9158cwe-79
Published: Fri Oct 24 2025 (10/24/2025, 06:00:10 UTC)
Source: CVE Database V5
Vendor/Project: Best Practical
Product: Request Tracker

Description

The Request Tracker software is vulnerable to a Stored XSS vulnerability in calendar invitation parsing feature, which displays invitation data without HTML sanitization. XSS vulnerability allows an attacker to send a specifically crafted e-mail enabling JavaScript code execution by displaying the ticket in the context of the logged-in user. This vulnerability affects versions from 5.0.4 through 5.0.8 and from 6.0.0 through 6.0.1.

AI-Powered Analysis

AILast updated: 10/31/2025, 06:48:59 UTC

Technical Analysis

CVE-2025-9158 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 that affects the Best Practical Request Tracker (RT) software, specifically versions 5.0.4 through 5.0.8 and 6.0.0 through 6.0.1. The vulnerability arises from improper neutralization of input during web page generation in the calendar invitation parsing feature. When an attacker sends a crafted email containing malicious HTML/JavaScript code embedded in calendar invitations, the software fails to sanitize this input before displaying it in the ticket interface. As a result, the malicious script executes in the browser context of any user who views the affected ticket, potentially compromising their session, stealing cookies, or performing actions on behalf of the user. The vulnerability does not require authentication to exploit, but the victim must interact by viewing the ticket containing the malicious invitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and low impact on confidentiality and integrity (VC:L, VI:L) with no impact on availability. No patches or exploit code are currently publicly available, but the flaw is documented and should be addressed promptly. The vulnerability is particularly concerning for organizations relying on RT for ticket and calendar management, as it could be leveraged for targeted phishing or lateral movement within internal networks.

Potential Impact

For European organizations, the impact of CVE-2025-9158 can be significant, especially for those using Request Tracker as a core tool for IT service management, helpdesk operations, or internal ticketing workflows. Successful exploitation could lead to session hijacking, unauthorized access to sensitive ticket data, or execution of malicious actions under the guise of legitimate users. This may result in data breaches, disruption of service management processes, and potential compliance violations under GDPR if personal or sensitive data is exposed. The vulnerability's exploitation could also facilitate further attacks such as privilege escalation or lateral movement within corporate networks. Given the medium CVSS score and the requirement for user interaction, the threat is moderate but should not be underestimated, particularly in sectors with high reliance on RT or where attackers may craft targeted spear-phishing emails embedding malicious calendar invites. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

European organizations should immediately identify and inventory all instances of Best Practical Request Tracker in use, focusing on versions 5.0.4 through 5.0.8 and 6.0.0 through 6.0.1. Since no official patches are currently linked, organizations should apply the following mitigations: 1) Implement strict email filtering and scanning to detect and quarantine suspicious calendar invitations or emails containing embedded HTML/JavaScript. 2) Restrict or disable the calendar invitation parsing feature if feasible until a patch is available. 3) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the RT web interface. 4) Educate users to be cautious when interacting with calendar invites or tickets from untrusted sources. 5) Monitor logs for unusual activity or repeated viewing of suspicious tickets. 6) Engage with Best Practical for updates and apply patches promptly once released. 7) Consider network segmentation to isolate RT servers and limit exposure. These targeted mitigations go beyond generic advice by focusing on the specific attack vector and software behavior.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-08-19T09:42:07.655Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68fb1ac81658c9c3946ecbca

Added to database: 10/24/2025, 6:20:56 AM

Last enriched: 10/31/2025, 6:48:59 AM

Last updated: 12/7/2025, 11:29:29 AM

Views: 220

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats