CVE-2025-68147
BaseFortify
Publication date: 2025-12-17
Last updated on: 2025-12-18
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| opensourcepos | open_source_point_of_sale | From 3.4.0 (inc) to 3.4.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the Open Source Point of Sale application versions 3.4.0 up to but not including 3.4.2. It occurs in the 'Return Policy' configuration field, where user input is not properly sanitized before being saved to the database or displayed on receipts. An attacker with access to the 'Store Configuration' (such as a rogue administrator or someone who has compromised an account via a separate CSRF vulnerability) can inject malicious JavaScript code into this field. This malicious code executes in the browsers of users who view receipts or complete transactions, potentially leading to session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of the victim.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to execute malicious JavaScript in the browsers of users viewing receipts or completing transactions. This can result in session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of the victim, potentially compromising user accounts and sensitive business information.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by inspecting the "Return Policy" configuration field in the Open Source Point of Sale application for any malicious JavaScript code or HTML tags. Since the vulnerability involves stored XSS in this field, checking the database entries or the configuration settings for suspicious script tags or unusual content can help identify exploitation. There are no specific commands provided to detect this vulnerability on the network or system.
What immediate steps should I take to mitigate this vulnerability?
Immediate steps to mitigate this vulnerability include ensuring that the "Return Policy" field contains only plain text and strictly avoiding entering any HTML tags. Administrators should review and sanitize this field to remove any potentially malicious scripts. The only code-based fix is to upgrade to version 3.4.2 or later, where the vulnerability is patched by escaping output using the `esc()` function in the receipt template.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to execute malicious scripts that can lead to session hijacking and theft of sensitive data. Such unauthorized access and data breaches can result in non-compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access and ensuring data integrity. Therefore, this vulnerability poses a risk to compliance with these standards by potentially exposing sensitive user data and enabling unauthorized actions. [2, 3]