CVE-2025-23458

Rakessh · Rakessh Multiple Products

A high-severity vulnerability has been identified in multiple Rakessh products, which could allow an attacker to execute malicious code within a user's web browser.

Executive summary

A high-severity vulnerability has been identified in multiple Rakessh products, which could allow an attacker to execute malicious code within a user's web browser. Successful exploitation occurs when a user clicks a specially crafted link, potentially leading to the theft of session credentials, sensitive data, or unauthorized actions performed on the user's behalf. Organizations are advised to apply vendor-supplied security updates immediately to mitigate this risk.

Vulnerability

The vulnerability is a Reflected Cross-Site Scripting (XSS) flaw within the Rakessh Ads24 Lite product. The application fails to properly sanitize user-supplied input before embedding it into a web page. An attacker can craft a malicious URL containing a JavaScript payload and trick a victim into clicking it. When the victim's browser sends the request to the server, the server "reflects" the malicious script back to the browser as part of the HTML response, causing the script to execute in the context of the trusted website.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.1. Exploitation could lead to significant business impacts, including the compromise of user accounts through session hijacking, theft of sensitive information entered into web forms, and redirection of users to malicious websites for phishing or malware delivery. These outcomes can result in direct financial loss, reputational damage, and a loss of customer trust in the organization's web services.

Remediation

Immediate Action: Apply vendor security updates immediately across all affected Rakessh products. After patching, monitor web server and application logs for any signs of past or ongoing exploitation attempts.

Proactive Monitoring: Security teams should configure monitoring to detect potential XSS attacks. This includes analyzing web server access logs for requests containing suspicious URL parameters, such as HTML tags (<script>, <img>), JavaScript event handlers (onerror, onload), or URL-encoded script characters. Web Application Firewall (WAF) logs should also be reviewed for alerts related to XSS signatures.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with a robust ruleset designed to detect and block XSS attack patterns. Additionally, enforcing a strict Content Security Policy (CSP) on the web server can help prevent browsers from executing unauthorized inline scripts, thereby mitigating the impact of a successful XSS injection.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the High severity rating (CVSS 7.1), it is strongly recommended that organizations prioritize the immediate application of the security patches provided by Rakessh. While this vulnerability is not currently listed on the CISA KEV catalog, its potential for user account compromise presents a significant risk. If patching is delayed, compensating controls such as a WAF and a strict Content Security Policy should be implemented as an urgent interim measure.