Home

Description

OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content within the Annual Report Enterprise Banner image upload field. Injected content is executed in the context of other users when they generate an Annual Report. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.

PUBLISHED Reserved 2025-10-07 | Published 2025-10-07 | Updated 2025-10-10 | Assigner cisa-cg




MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unknown

Any version before 11.13.3.0
affected

11.13.3.0
unaffected

Credits

Aaron M. Ramirez, United States Department of Justice

Wesley Cuffee, United States Department of Justice

References

docs.opexustech.com/...OIAXpress_Release_Notes_11.13.3.0.pdf (url)

raw.githubusercontent.com/...IT/white/2025/va-25-280-01.json (url)

www.cve.org/CVERecord?id=CVE-2025-61997 (url)

cve.org (CVE-2025-61997)

nvd.nist.gov (CVE-2025-61997)

Download JSON