Home

Description

OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content as a URL within the Technical Support Hyperlink Manager. Injected content is executed in the context of other users when they click the malicious link. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.

PUBLISHED Reserved 2025-10-07 | Published 2025-10-07 | Updated 2025-10-10 | Assigner cisa-cg




MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unknown

Any version before 11.13.3.0
affected

11.13.3.0
unaffected

Credits

Aaron M. Ramirez, United States Department of Justice

Wesley Cuffee, United States Department of Justice

References

docs.opexustech.com/...OIAXpress_Release_Notes_11.13.3.0.pdf (url)

www.cve.org/CVERecord?id=CVE-2025-61998 (url)

raw.githubusercontent.com/...IT/white/2025/va-25-280-01.json (url)

cve.org (CVE-2025-61998)

nvd.nist.gov (CVE-2025-61998)

Download JSON