CVE-2025-25035

7.3 HIGH

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability in Jalios JPlatform allows attackers to inject malicious scripts into web pages, which execute in victims' browsers. It affects JPlatform 10 before specific service packs and multiple Jalios Workplace versions, enabling both reflected and stored XSS attacks that could compromise user sessions and data.

💻 Affected Systems

Products:
  • Jalios JPlatform 10
  • Jalios Workplace 6.2
  • Jalios Workplace 6.1
  • Jalios Workplace 6.0
  • Jalios Workplace 5.3
  • Jalios Workplace 5.4
  • Jalios Workplace 5.5
Versions: JPlatform 10: before 10.0.8 (SP8), before 10.0.7 (SP7), before 10.0.6 (SP6); Workplace 6.2, 6.1, 6.0, 5.3-5.5
Operating Systems: Any OS running affected software
Default Config Vulnerable: ⚠️ Yes
Notes: Both reflected and stored XSS variants exist, affecting multiple components within the platform.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, deface websites, redirect users to malicious sites, or install malware through client-side attacks.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized actions performed on behalf of legitimate users through crafted malicious links or stored content.

🟢

If Mitigated

With proper input validation and output encoding, the risk is reduced to minimal, though the vulnerability still exists in the codebase.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting malicious input that bypasses existing filters, but detailed techniques are not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JPlatform 10.0.8 (SP8) or later; Workplace users should upgrade to latest supported versions

Vendor Advisory: https://community.jalios.com/jcms/jc1_893720/en/security-alert-2025-02-19

Restart Required: No

Instructions:

1. Backup your installation and database. 2. Download the latest service pack from Jalios support portal. 3. Apply the patch following vendor instructions. 4. Test functionality in staging environment before production deployment.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize user inputs before processing

Implement custom servlet filters or modify existing validation logic

Content Security Policy

all

Deploy CSP headers to restrict script execution sources

Add 'Content-Security-Policy' header with appropriate directives

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) with XSS protection rules
  • Disable or restrict user input fields that accept HTML/JavaScript content

🔍 How to Verify

Check if Vulnerable:

Check version in administration panel or via system properties; compare against affected versions list

Check Version:

Check administration panel or review application.properties files

Verify Fix Applied:

Verify version is 10.0.8 or later for JPlatform; test XSS payloads in input fields to confirm sanitization

📡 Detection & Monitoring

Log Indicators:

  • Unusual long parameter values in HTTP requests
  • Requests containing script tags or JavaScript patterns
  • Multiple failed input validation attempts

Network Indicators:

  • HTTP requests with encoded script payloads in parameters
  • Unusual redirect patterns

SIEM Query:

source="web_server" AND (uri="*<script*" OR param="*javascript:*" OR param="*onerror=*" OR param="*onload=*")

🔗 References

📤 Share & Export