CVE-2025-25247

6.1 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in Apache Felix Webconsole that allows attackers to inject malicious scripts into web pages. The vulnerability affects versions 4.x up to 4.9.8 and 5.x up to 5.0.8. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions.

💻 Affected Systems

Products:
  • Apache Felix Webconsole
Versions: 4.x up to 4.9.8, 5.x up to 5.0.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments using vulnerable versions of Apache Felix Webconsole regardless of underlying OS or configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack sessions, perform unauthorized administrative actions, or deploy malware to users accessing the webconsole.

🟠

Likely Case

Session hijacking or credential theft leading to unauthorized access to the Felix Webconsole management interface.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented at application layer, though the underlying vulnerability remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity, but successful exploitation requires user interaction with the malicious payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.10 or 5.0.10 or higher

Vendor Advisory: https://lists.apache.org/thread/z47jbf0rbylzd0ktfzdw9c8b5fpyl24m

Restart Required: Yes

Instructions:

1. Download Apache Felix Webconsole version 4.9.10 or 5.0.10 or higher from official Apache repositories. 2. Replace the existing webconsole bundle with the patched version. 3. Restart the OSGi framework to load the updated bundle.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement a servlet filter to sanitize user input before processing by the webconsole

Implement custom servlet filter with input validation logic

Content Security Policy

all

Implement strict CSP headers to mitigate XSS impact

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to HTTP headers

🧯 If You Can't Patch

  • Restrict network access to the Felix Webconsole to trusted IP addresses only
  • Implement web application firewall (WAF) rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check the Felix Webconsole version via the web interface or by examining the bundle version in the OSGi console

Check Version:

Access Felix Webconsole interface and check version in footer or use OSGi console command: 'lb | grep org.apache.felix.webconsole'

Verify Fix Applied:

Verify the installed version is 4.9.10+ or 5.0.10+ and test XSS payloads are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in HTTP requests
  • Multiple failed XSS attempts in access logs

Network Indicators:

  • HTTP requests containing script tags or JavaScript payloads to webconsole endpoints

SIEM Query:

source="webconsole_access.log" AND ("<script>" OR "javascript:" OR "onload=" OR "onerror=")

🔗 References

📤 Share & Export