CVE-2025-2597

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in ITIUM 6050 version 5.5.5.2-b3526 allows attackers to inject malicious JavaScript via GET and POST requests to the '/index.php' endpoint by manipulating the 'id_session' parameter. This affects organizations using Impact Technologies' ITIUM 6050 software. Attackers could steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • ITIUM 6050
Versions: 5.5.5.2-b3526
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default configuration when using the affected version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full administrative access to the ITIUM system, and potentially compromises the entire network infrastructure managed by the platform.

🟠

Likely Case

Attacker steals user session cookies to impersonate legitimate users, accesses sensitive information, or performs unauthorized actions within the application.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before execution, preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into clicking malicious links containing the XSS payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/reflected-cross-site-scripting-xss-vulnerability-itium-6050

Restart Required: No

Instructions:

1. Monitor vendor website for security updates. 2. Apply patch when available. 3. Test in non-production environment first.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to filter malicious requests.

Input Validation

all

Implement server-side validation to sanitize 'id_session' parameter values.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources.
  • Deploy network segmentation to isolate ITIUM systems from critical assets.

🔍 How to Verify

Check if Vulnerable:

Test by sending a GET request to '/index.php' with a malicious script in the 'id_session' parameter and checking if it executes in the response.

Check Version:

Check the ITIUM 6050 web interface or configuration files for version information.

Verify Fix Applied:

After applying fixes, repeat the test to confirm the script is properly sanitized and does not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests to '/index.php' with JavaScript payloads in parameters
  • Multiple failed login attempts or session hijacking alerts

Network Indicators:

  • HTTP requests containing script tags or JavaScript code in URL parameters
  • Traffic patterns showing users being redirected to malicious sites

SIEM Query:

source="web_server_logs" AND uri_path="/index.php" AND (query_string CONTAINS "<script>" OR query_string CONTAINS "javascript:")

🔗 References

📤 Share & Export