CVE-2025-46545

4.4 MEDIUM

📋 TL;DR

This vulnerability allows stored cross-site scripting (XSS) attacks in Sherpa Orchestrator version 141851. Administrators can inject malicious scripts through the license name parameter, which execute when the license expires. Only administrators with license management privileges are affected.

💻 Affected Systems

Products:
  • Sherpa Orchestrator
Versions: 141851
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator access to license management functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with administrator credentials could steal session cookies, perform actions as the administrator, or redirect users to malicious sites when they view license information.

🟠

Likely Case

Privilege escalation within the application, session hijacking, or defacement of license management pages.

🟢

If Mitigated

Limited impact due to requiring administrator credentials and specific trigger condition (license expiration).

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials and knowledge of XSS payloads. Public proof-of-concept exists in GitHub gist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://sherparpa.com

Restart Required: No

Instructions:

1. Check vendor advisory at sherparpa.com for updates. 2. Apply any available patches. 3. Validate fix by testing license name input sanitization.

🔧 Temporary Workarounds

Input Validation for License Names

all

Implement server-side validation to sanitize HTML/JavaScript from license name inputs

Implement input sanitization in license management code

Content Security Policy

all

Implement CSP headers to restrict script execution

Add Content-Security-Policy header to web server configuration

🧯 If You Can't Patch

  • Restrict administrator access to only trusted personnel
  • Monitor license management activities and audit logs for suspicious inputs

🔍 How to Verify

Check if Vulnerable:

Test if HTML/JavaScript can be injected into license name field and persists in the system

Check Version:

Check Sherpa Orchestrator version in administration panel or configuration files

Verify Fix Applied:

Verify that HTML/JavaScript input in license name field is properly sanitized and doesn't execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual license name entries containing script tags or JavaScript
  • Multiple license updates from single administrator

Network Indicators:

  • HTTP requests with script payloads in license name parameters

SIEM Query:

Search for license management events with suspicious strings like <script>, javascript:, or eval()

🔗 References

📤 Share & Export