CVE-2025-46749

4.3 MEDIUM

📋 TL;DR

This is a cross-site scripting (XSS) vulnerability in SEL software where authenticated users can inject malicious scripts into improperly sanitized input fields. The scripts execute in other users' browsers when they view the affected content. This affects users of SEL software with authenticated access to vulnerable versions.

💻 Affected Systems

Products:
  • SEL software products (specific products not detailed in reference)
Versions: Versions prior to latest release (exact range unspecified in reference)
Operating Systems: Not specified in reference
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; exact affected products and versions need verification from vendor advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal session cookies, perform actions as other users, deface interfaces, or redirect users to malicious sites.

🟠

Likely Case

Session hijacking, credential theft, or limited data exfiltration from authenticated users' browsers.

🟢

If Mitigated

Minimal impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of vulnerable fields; typical XSS techniques apply.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest software versions (specific version not detailed)

Vendor Advisory: https://selinc.com/products/software/latest-software-versions/

Restart Required: Yes

Instructions:

1. Visit the SEL software versions page. 2. Identify and download the latest version for your product. 3. Follow vendor installation procedures. 4. Restart the application/service as required.

🔧 Temporary Workarounds

Implement Input Validation

all

Add server-side validation to reject or sanitize script-containing input in user-submitted fields.

Enable Content Security Policy

all

Configure CSP headers to restrict script execution sources and mitigate XSS impact.

🧯 If You Can't Patch

  • Restrict user permissions to minimize who can submit content to vulnerable fields.
  • Monitor and audit user-submitted content for suspicious scripting patterns.

🔍 How to Verify

Check if Vulnerable:

Test input fields for XSS by submitting safe payloads (e.g., <script>alert('test')</script>) and checking if they execute in other users' views.

Check Version:

Check software version via application interface or vendor documentation; command varies by product.

Verify Fix Applied:

After patching, retest XSS payloads to confirm they are properly sanitized or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user input containing script tags or JavaScript patterns in field submissions

Network Indicators:

  • HTTP requests with script payloads in parameters or POST data

SIEM Query:

source="application_logs" AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export