CVE-2025-47773
📋 TL;DR
Combodo iTop versions before 2.7.13 and 3.2.2 contain a cross-site scripting vulnerability in dashboard editing via AJAX calls. This allows attackers to inject malicious scripts that execute in users' browsers when viewing manipulated dashboards. All users of affected iTop versions are vulnerable.
💻 Affected Systems
- Combodo iTop
📦 What is this software?
Itop by Combodo
Itop by Combodo
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on client systems.
Likely Case
Session hijacking leading to unauthorized access, data theft, or privilege escalation within the iTop application.
If Mitigated
Limited impact with proper input validation and output encoding, though some client-side disruption may still occur.
🎯 Exploit Status
Exploitation requires authenticated access to dashboard editing functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.7.13 or 3.2.2
Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-9qmf-5457-9xp3
Restart Required: Yes
Instructions:
1. Backup your iTop installation and database. 2. Download iTop version 2.7.13 or 3.2.2 from official sources. 3. Follow the iTop upgrade documentation for your version. 4. Restart the web server service.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation for all dashboard editing parameters
Content Security Policy
allImplement strict CSP headers to limit script execution
🧯 If You Can't Patch
- Restrict dashboard editing permissions to trusted administrators only
- Implement web application firewall rules to block suspicious AJAX requests
🔍 How to Verify
Check if Vulnerable:
Check iTop version in administration panel or by examining the installation directory version files
Check Version:
Check the 'version.php' file in iTop installation directory or use the web interface's About page
Verify Fix Applied:
Verify version is 2.7.13 or higher for 2.x branch, or 3.2.2 or higher for 3.x branch
📡 Detection & Monitoring
Log Indicators:
- Unusual AJAX requests to dashboard editing endpoints
- Suspicious script tags or JavaScript in dashboard content
Network Indicators:
- Malicious script payloads in HTTP POST requests to dashboard AJAX endpoints
SIEM Query:
source="iTop" AND (uri_path="/pages/ajax.render.php" OR uri_path="/pages/ajax.dashboard.php") AND (http_method="POST") AND (content CONTAINS "<script>" OR content CONTAINS "javascript:")