CVE-2025-7920
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-21

Last updated on: 2025-07-22

Assigner: TWCERT/CC

Description
WinMatrix3 Web package developed by Simopro Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-21
Last Modified
2025-07-22
Generated
2026-05-07
AI Q&A
2025-07-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
simopro_technology winmatrix3_web *
simopro_technology winmatrix_web 3.8.52.5
simopro_technology winmatrix_web 1.2.39.5
simopro_technology winmatrix_web 3.9.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-7920 is a Reflected Cross-Site Scripting (XSS) vulnerability in the WinMatrix3 Web package developed by Simopro Technology. It allows unauthenticated remote attackers to execute arbitrary JavaScript code in a user's browser by tricking the user into clicking a malicious link, typically through phishing attacks. This means attackers can run scripts in the context of the victim's browser session, potentially stealing information or performing actions on behalf of the user. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute arbitrary JavaScript code in your browser without needing any privileges or authentication. Through phishing attacks, attackers can steal sensitive information, manipulate web content, or perform unauthorized actions within your browser session. Although the impact on confidentiality and integrity is low and availability is not affected, the vulnerability still poses a risk to your data security and privacy. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

The immediate steps to mitigate this vulnerability are to update the affected WinMatrix3 Web package to version 3.8.52.5 (Web 1.2.39.5) with the hotfix installed or to version 3.9.1 (Web 1.3.1) or later. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart