CVE-2025-53839
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-15

Last updated on: 2025-07-15

Assigner: GitHub, Inc.

Description
DRACOON is a file sharing service, and the DRACOON Branding Service allows customers to customize their DRACOON interface with their brand. Versions of the DRACOON Branding Service prior to 2.10.0 are vulnerable to cross-site scripting. Improper neutralization of input from administrative users could inject HTML code into the workflow for newly onboarded users. A fix was made available in version 2.10.0 and rolled out to the DRACOON service. DRACOON customers do not need to take action.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-15
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dracoon branding_service *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a cross-site scripting (XSS) issue in the DRACOON Branding Service prior to version 2.10.0. It occurs because administrative user input is not properly neutralized, allowing malicious HTML code to be injected into the workflow for newly onboarded users. This can lead to limited impacts on confidentiality and integrity. [1]


How can this vulnerability impact me? :

The vulnerability can impact you by allowing attackers to inject malicious HTML code into the onboarding workflow, potentially compromising the confidentiality and integrity of information seen by new users. However, it does not affect system availability. Exploitation requires network access, high privileges, and user interaction. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves verifying the version of the DRACOON Branding Service in use to ensure it is 2.10.0 or later. Since the vulnerability is related to cross-site scripting via administrative input, monitoring for unusual HTML or script injections in the onboarding workflow could help. However, no specific detection commands or network scanning techniques are provided in the available resources. [1]


What immediate steps should I take to mitigate this vulnerability?

The vulnerability was fixed in DRACOON Branding Service version 2.10.0, which has been rolled out to the DRACOON service. DRACOON customers do not need to take any action. Immediate mitigation involves ensuring the service is updated to version 2.10.0 or later. If running an on-premises instance, upgrade to the fixed version to mitigate the vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart