CVE-2025-40769
BaseFortify
Publication date: 2025-08-12
Last updated on: 2025-08-12
Assigner: Siemens AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| siemens | sinec_traffic_analyzer | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1164 | The product contains code that is not essential for execution, i.e. makes no state changes and has no side effects that alter data or control flow, such that removal of the code would have no impact to functionality or correctness. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in SINEC Traffic Analyzer (all versions before V3.0) due to its Content Security Policy allowing unsafe script execution methods. This flaw could enable an attacker to execute unauthorized scripts, potentially resulting in cross-site scripting (XSS) attacks.
How can this vulnerability impact me? :
The vulnerability could allow attackers to execute unauthorized scripts within the affected application, which may lead to cross-site scripting attacks. Such attacks can compromise user data, session tokens, or perform actions on behalf of the user without their consent.