CVE-2025-40772
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-14

Last updated on: 2025-10-16

Assigner: Siemens AG

Description
A vulnerability has been identified in SiPass integrated (All versions < V3.0). Affected server applications are vulnerable to stored Cross-Site Scripting (XSS), allowing an attacker to inject malicious code that can be executed by other users when they visit the affected page. Successful exploitation allows an attacker to impersonate other users within the application and steal their session data. This could enable unauthorized access to accounts and potentially lead to privilege escalation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-14
Last Modified
2025-10-16
Generated
2026-05-07
AI Q&A
2025-10-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
siemens sipass_integrated to 3.00 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-40772 is a stored Cross-Site Scripting (XSS) vulnerability in SiPass integrated server applications (all versions before V3.0). It allows an attacker to inject malicious code that is stored on the server and executed by other users when they visit the affected page. This can lead to attackers impersonating other users and stealing their session data, potentially enabling unauthorized access and privilege escalation. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to impersonate other users within the application and steal their session data. This could result in unauthorized access to user accounts and potentially lead to privilege escalation, compromising the security and integrity of your system and data. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this stored Cross-Site Scripting (XSS) vulnerability in SiPass integrated (versions prior to V3.0) involves monitoring for unusual or malicious script injections in the web application pages served by the affected server. Since the vulnerability allows injection of malicious code that executes when other users visit affected pages, inspecting web traffic and application logs for suspicious script tags or payloads can help detect exploitation attempts. Specific commands are not provided in the resources, but general approaches include using web vulnerability scanners that detect stored XSS, reviewing HTTP responses for injected scripts, and monitoring user activity for signs of session hijacking or impersonation. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update SiPass integrated to version 3.0 or later, as recommended by Siemens, which addresses this vulnerability. Additionally, restrict access to authorized and trusted personnel only, protect network access with appropriate security mechanisms, and operate devices in a secure IT environment to reduce exposure. Avoid uploading untrusted content that could be used to exploit related vulnerabilities. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart