Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9913: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in SICK AG Baggage Analytics

0
Medium
VulnerabilityCVE-2025-9913cvecve-2025-9913cwe-79
Published: Mon Oct 06 2025 (10/06/2025, 06:40:49 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: Baggage Analytics

Description

JavaScript can be ran inside the address bar via the dashboard "Open in new Tab" Button, making the application vulnerable to session hijacking.

AI-Powered Analysis

AILast updated: 10/06/2025, 07:04:21 UTC

Technical Analysis

CVE-2025-9913 identifies a cross-site scripting (CWE-79) vulnerability in the SICK AG Baggage Analytics product, present in all versions. The vulnerability arises from improper neutralization of input during web page generation, specifically through the dashboard's 'Open in new Tab' button. This flaw permits an attacker to inject and execute arbitrary JavaScript code within the address bar context when a user interacts with this feature. The primary risk is session hijacking, where an attacker can steal session tokens or cookies, compromising user confidentiality. The vulnerability requires the attacker to have authenticated access and for the user to perform an action (clicking the button), which limits remote exploitation but does not eliminate risk. The CVSS 3.1 score is 4.5 (medium), reflecting network attack vector, low attack complexity, required privileges, and user interaction. No integrity or availability impacts are noted. No patches are currently available, and no known exploits have been reported in the wild. The vulnerability is significant for environments where Baggage Analytics is deployed, particularly in airport baggage handling systems, as session hijacking could lead to unauthorized access to sensitive operational data or control interfaces. The root cause is insufficient input sanitization or output encoding in the web interface, allowing JavaScript injection via URL parameters or dashboard controls.

Potential Impact

For European organizations, especially those in the transportation, logistics, and airport management sectors using SICK AG's Baggage Analytics, this vulnerability poses a confidentiality risk through session hijacking. Attackers could gain unauthorized access to user sessions, potentially exposing sensitive operational data or enabling further unauthorized actions within the system. While the vulnerability does not affect data integrity or system availability directly, compromised sessions could be leveraged for lateral movement or data exfiltration. The requirement for authenticated access and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks. Given the critical role of baggage analytics in airport operations, any compromise could disrupt workflows or erode trust in system security. Additionally, regulatory frameworks such as GDPR impose strict data protection requirements, and session hijacking incidents could lead to compliance violations and reputational damage.

Mitigation Recommendations

Organizations should implement strict input validation and output encoding on all user-controllable inputs, particularly those involved in the 'Open in new Tab' dashboard feature. Until a vendor patch is released, disabling or restricting access to this feature for non-essential users can reduce risk. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Monitoring user sessions for anomalies and enforcing session timeouts and multi-factor authentication can limit session hijacking consequences. Security teams should conduct regular code reviews and penetration testing focused on web interface vulnerabilities. Additionally, educating users about the risks of interacting with untrusted links or dashboard elements can reduce exploitation chances. Once available, promptly applying vendor patches is critical. Network segmentation of the baggage analytics system and limiting administrative access to trusted personnel further reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SICK AG
Date Reserved
2025-09-03T08:58:58.185Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e366f236c79392d67e7d7f

Added to database: 10/6/2025, 6:51:30 AM

Last enriched: 10/6/2025, 7:04:21 AM

Last updated: 10/6/2025, 8:36:08 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats