CVE-2025-66258
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-26

Last updated on: 2025-12-03

Assigner: Gridware

Description
Stored Cross-Site Scripting via XML Injection in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Stored XSS via crafted filenames injected into patchlist.xml. User-controlled filenames are directly concatenated into `patchlist.xml` without encoding, allowing injection of malicious JavaScript payloads via crafted filenames (e.g., `<img src=x onerror=alert()>.bin`). The XSS executes when ajax.js processes and renders the XML file.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-26
Last Modified
2025-12-03
Generated
2026-05-07
AI Q&A
2025-11-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 44 associated CPEs
Vendor Product Version / Range
dbbroadcast mozart_next_6000_firmware *
dbbroadcast mozart_next_6000 *
dbbroadcast mozart_next_500_firmware *
dbbroadcast mozart_next_500 *
dbbroadcast mozart_next_50_firmware *
dbbroadcast mozart_next_50 *
dbbroadcast mozart_next_3500_firmware *
dbbroadcast mozart_next_3500 *
dbbroadcast mozart_next_3000_firmware *
dbbroadcast mozart_next_3000 *
dbbroadcast mozart_next_300_firmware *
dbbroadcast mozart_next_300 *
dbbroadcast mozart_next_30_firmware *
dbbroadcast mozart_next_30 *
dbbroadcast mozart_next_2000_firmware *
dbbroadcast mozart_next_2000 *
dbbroadcast mozart_next_1000_firmware *
dbbroadcast mozart_next_1000 *
dbbroadcast mozart_next_100_firmware *
dbbroadcast mozart_next_100 *
dbbroadcast mozart_next_7000_firmware *
dbbroadcast mozart_next_7000 *
dbbroadcast mozart_dds_next_30_firmware *
dbbroadcast mozart_dds_next_30 *
dbbroadcast mozart_dds_next_50_firmware *
dbbroadcast mozart_dds_next_50 *
dbbroadcast mozart_dds_next_100_firmware *
dbbroadcast mozart_dds_next_100 *
dbbroadcast mozart_dds_next_300_firmware *
dbbroadcast mozart_dds_next_300 *
dbbroadcast mozart_dds_next_500_firmware *
dbbroadcast mozart_dds_next_500 *
dbbroadcast mozart_dds_next_1000_firmware *
dbbroadcast mozart_dds_next_1000 *
dbbroadcast mozart_dds_next_2000_firmware *
dbbroadcast mozart_dds_next_2000 *
dbbroadcast mozart_dds_next_3000_firmware *
dbbroadcast mozart_dds_next_3000 *
dbbroadcast mozart_dds_next_3500_firmware *
dbbroadcast mozart_dds_next_3500 *
dbbroadcast mozart_dds_next_6000_firmware *
dbbroadcast mozart_dds_next_6000 *
dbbroadcast mozart_dds_next_7000_firmware *
dbbroadcast mozart_dds_next_7000 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Stored Cross-Site Scripting (XSS) via XML Injection in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30 through 7000. It occurs because user-controlled filenames are directly concatenated into the patchlist.xml file without proper encoding. An attacker can craft malicious filenames containing JavaScript payloads (e.g., <img src=x onerror=alert()>.bin) that get injected into patchlist.xml. When the ajax.js script processes and renders this XML file, the malicious script executes, leading to Stored XSS.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary JavaScript in the context of the affected application. This can lead to unauthorized actions such as stealing user session tokens, defacing the user interface, redirecting users to malicious sites, or performing actions on behalf of the user without their consent. Since it is a Stored XSS, the malicious payload persists and can affect multiple users.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart