CVE-2025-40709
BaseFortify
Publication date: 2025-08-29
Last updated on: 2025-09-02
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| craws | openatlas | 8.9.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability can allow a remote attacker to execute malicious scripts in the context of an authenticated user, leading to theft of session cookies. This can result in unauthorized access to the user's session and potentially compromise the user's account and data.
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Scripting (XSS) issue in OpenAtlas v8.9.0 caused by inadequate validation of user input in POST requests. Specifically, it affects the '/insert/person/<ID>' endpoint and the 'name' and 'alias-0' parameters. An attacker can send specially crafted queries to an authenticated user, potentially stealing their session cookie details.