CVE-2025-27139

6.8 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into the preferences page of Combodo iTop, a web-based IT service management tool. When exploited, it enables cross-site scripting attacks that can steal session cookies, redirect users, or perform actions on their behalf. Organizations using iTop versions prior to 2.7.12, 3.1.2, or 3.2.0 are affected.

💻 Affected Systems

Products:
  • Combodo iTop
Versions: All versions prior to 2.7.12, 3.1.2, and 3.2.0
Operating Systems: Any OS running iTop web application
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the preferences page functionality; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full administrative access to iTop, and potentially compromises the entire IT service management system and connected infrastructure.

🟠

Likely Case

Attacker steals user session cookies, impersonates legitimate users, accesses sensitive IT service data, and performs unauthorized actions within their permission scope.

🟢

If Mitigated

Script execution is blocked by Content Security Policy or input validation, limiting impact to minor UI disruption without data compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction with malicious link or crafted content; authenticated access to preferences page needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.12, 3.1.2, or 3.2.0

Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-c6mg-9537-c8cf

Restart Required: Yes

Instructions:

1. Backup your iTop installation and database. 2. Download the patched version (2.7.12, 3.1.2, or 3.2.0) from official sources. 3. Follow the iTop upgrade documentation for your version. 4. Restart the web server service. 5. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Content Security Policy Implementation

all

Implement strict Content Security Policy headers to block inline script execution and restrict script sources.

Add to web server configuration: Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval';

Input Validation Filter

all

Add web application firewall rules or input validation to sanitize user input on preferences page.

Configure WAF to filter <script> tags and JavaScript event handlers in POST/GET parameters

🧯 If You Can't Patch

  • Restrict access to iTop application to trusted networks only using firewall rules.
  • Implement strong session management with short timeouts and secure cookie attributes (HttpOnly, Secure).

🔍 How to Verify

Check if Vulnerable:

Check iTop version in administration panel or by examining the application files; versions below 2.7.12, 3.1.2, or 3.2.0 are vulnerable.

Check Version:

Check iTop configuration file or administration dashboard for version information.

Verify Fix Applied:

After patching, verify version shows 2.7.12, 3.1.2, or 3.2.0 in administration panel and test preferences page functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests to preferences page with script tags or JavaScript code
  • Multiple failed login attempts followed by preferences page access

Network Indicators:

  • HTTP requests containing <script> tags or JavaScript in URL parameters or POST data to preferences endpoint

SIEM Query:

source="iTop_logs" AND (uri_path="/pages/preferences" AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:"))

🔗 References

📤 Share & Export