CVE-2025-22917

5.4 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in Audemium ERP allows attackers to inject malicious JavaScript via the 'type' parameter in list.php. This could lead to session hijacking, data theft, or redirection to malicious sites. Users of Audemium ERP version 0.9.0 and earlier are affected.

💻 Affected Systems

Products:
  • Audemium ERP
Versions: <=0.9.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Any installation with list.php accessible is vulnerable. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals admin session cookies, gains full system access, exfiltrates sensitive data, or installs malware on user systems.

🟠

Likely Case

Attacker steals user session cookies to impersonate legitimate users, potentially accessing sensitive ERP data.

🟢

If Mitigated

With proper input validation and output encoding, the attack fails, causing no impact beyond failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking a user into clicking a malicious link. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Consider upgrading if a newer version is released or apply workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to sanitize the 'type' parameter in list.php, allowing only expected values.

Modify list.php to validate/sanitize input before processing.

Web Application Firewall (WAF) Rule

all

Deploy a WAF rule to block requests containing JavaScript in the 'type' parameter.

Add WAF rule: Block if request parameter 'type' contains '<script>' or 'javascript:'

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution.
  • Use browser security features like HttpOnly and Secure flags for cookies to limit session theft impact.

🔍 How to Verify

Check if Vulnerable:

Test by accessing list.php with a payload like: list.php?type=<script>alert('XSS')</script> and check if script executes.

Check Version:

Check ERP version in admin panel or configuration files; version should be >0.9.0 if patched.

Verify Fix Applied:

After applying fixes, retest with the same payload; script should not execute and input should be sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing requests to list.php with suspicious 'type' parameter values containing script tags or JavaScript.

Network Indicators:

  • HTTP requests with 'type' parameter containing encoded or obfuscated JavaScript payloads.

SIEM Query:

source="web_logs" AND uri="*list.php*" AND (param="*<script>*" OR param="*javascript:*")

🔗 References

📤 Share & Export