CVE-2025-62962

Andrea · Andrea Landonio Multiple Products

A high-severity vulnerability has been identified in multiple products by Andrea Landonio, specifically within the CloudSearch component.

Executive summary

A high-severity vulnerability has been identified in multiple products by Andrea Landonio, specifically within the CloudSearch component. This flaw allows an attacker to trick an authenticated user into unknowingly executing malicious actions, which can lead to the injection of persistent malicious code into the application. Successful exploitation could result in the compromise of user accounts, data theft, and website defacement.

Vulnerability

The vulnerability is a chain of Cross-Site Request Forgery (CSRF) leading to Stored Cross-Site Scripting (XSS). The application lacks proper CSRF protection on functions that save data for later display. An attacker can craft a malicious webpage or link and trick a logged-in administrator into accessing it. The victim's browser will automatically send a request to the vulnerable application, which, without a valid CSRF token, will process the attacker's request, saving a malicious script (XSS payload) into the application's database. This stored script will then execute in the browser of any user who views the page where the malicious data is displayed.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation could lead to the compromise of all user and administrator accounts, allowing an attacker to steal sensitive session cookies, capture credentials, or perform actions on behalf of the victim. The persistent nature of the Stored XSS means the malicious code remains active, affecting every user who accesses the compromised page, leading to potential widespread data breaches, reputational damage, and loss of customer trust.

Remediation

Immediate Action: Apply vendor security updates immediately across all systems running the affected software. After patching, it is critical to monitor for any signs of post-patch exploitation attempts and thoroughly review historical access logs for indicators of compromise that may have occurred prior to remediation.

Proactive Monitoring: Implement monitoring of web server and application logs for suspicious POST requests to configuration or data-entry endpoints, especially those lacking a Referer header or containing HTML/script tags. Deploy and monitor a Web Application Firewall (WAF) for alerts related to XSS and CSRF attack signatures. Regularly audit application settings and content for unauthorized or malicious code injections.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with strict rules to block XSS payloads and enforce CSRF protection. Enforce a strong Content Security Policy (CSP) on the web server to prevent the execution of untrusted scripts. Additionally, restrict administrative access to the application to a trusted network or via a VPN to reduce the attack surface.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the High severity (CVSS 8.8) of this vulnerability and its potential for complete user account compromise, immediate action is required. The primary recommendation is to apply the vendor-supplied patches to all affected systems without delay. Although this CVE is not currently listed on the CISA KEV list, its high impact score signifies a critical risk. Organizations unable to patch immediately should implement the suggested compensating controls, such as WAF rules and access restrictions, to mitigate the risk until patches can be deployed.