CVE-2025-40587

7.6 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to inject malicious JavaScript into document titles in Polarion applications. When other users view these documents, the script executes in their browsers, enabling stored cross-site scripting attacks. Affected users include all authenticated Polarion users on vulnerable versions.

💻 Affected Systems

Products:
  • Polarion V2404
  • Polarion V2410
Versions: Polarion V2404 < V2404.5, Polarion V2410 < V2410.2
Operating Systems: All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to create documents with malicious titles.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, hijack user accounts, perform actions as authenticated users, or redirect to malicious sites, potentially leading to full system compromise.

🟠

Likely Case

Attackers steal session tokens to impersonate users, access sensitive project data, or modify application content.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute JavaScript, limiting impact to benign title display issues.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2404.5 or V2410.2

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-035571.html

Restart Required: Yes

Instructions:

1. Download latest patch from Siemens support portal. 2. Backup Polarion instance. 3. Apply patch according to vendor instructions. 4. Restart Polarion services. 5. Verify version update.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to strip or escape JavaScript from document titles

Content Security Policy

all

Implement strict CSP headers to prevent script execution from untrusted sources

🧯 If You Can't Patch

  • Restrict document creation permissions to trusted users only
  • Implement web application firewall rules to block XSS payloads in titles

🔍 How to Verify

Check if Vulnerable:

Check Polarion version in administration console or via Polarion CLI: polarion version

Check Version:

polarion version

Verify Fix Applied:

Verify version shows V2404.5 or higher for V2404, or V2410.2 or higher for V2410

📡 Detection & Monitoring

Log Indicators:

  • Unusual document title creation patterns
  • JavaScript patterns in document metadata

Network Indicators:

  • Unexpected script tags in HTTP responses for document titles

SIEM Query:

source="polarion" AND (title CONTAINS "<script>" OR title CONTAINS "javascript:")

🔗 References

📤 Share & Export