CVE-2025-7920
BaseFortify
Publication date: 2025-07-21
Last updated on: 2025-07-22
Assigner: TWCERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| simopro_technology | winmatrix3_web | * |
| simopro_technology | winmatrix_web | 3.8.52.5 |
| simopro_technology | winmatrix_web | 1.2.39.5 |
| simopro_technology | winmatrix_web | 3.9.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-7920 is a Reflected Cross-Site Scripting (XSS) vulnerability in the WinMatrix3 Web package developed by Simopro Technology. It allows unauthenticated remote attackers to execute arbitrary JavaScript code in a user's browser by tricking the user into clicking a malicious link, typically through phishing attacks. This means attackers can run scripts in the context of the victim's browser session, potentially stealing information or performing actions on behalf of the user. [1, 2]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to execute arbitrary JavaScript code in your browser without needing any privileges or authentication. Through phishing attacks, attackers can steal sensitive information, manipulate web content, or perform unauthorized actions within your browser session. Although the impact on confidentiality and integrity is low and availability is not affected, the vulnerability still poses a risk to your data security and privacy. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
The immediate steps to mitigate this vulnerability are to update the affected WinMatrix3 Web package to version 3.8.52.5 (Web 1.2.39.5) with the hotfix installed or to version 3.9.1 (Web 1.3.1) or later. [1, 2]