CVE-2025-54346
BaseFortify
Publication date: 2025-11-14
Last updated on: 2025-11-20
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| desktopalert | pingalert_application_server | From 6.1.0.11 (inc) to 6.1.1.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-80 | The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Reflected Cross Site Scripting (XSS) issue found in the Application Server of Desktop Alert PingAlert versions 6.1.0.11 to 6.1.1.2. It allows an attacker to inject malicious scripts into the web application, which are then reflected back to the user's browser. This can lead to the attacker hijacking the user's browser and potentially capturing sensitive information.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an attacker to hijack your browser session, which may result in theft of sensitive information such as cookies, session tokens, or other private data accessible through the browser. This can lead to unauthorized access to your accounts or data breaches.