CVE-2025-48065

8.8 HIGH

📋 TL;DR

This cross-site scripting (XSS) vulnerability in Combodo iTop allows attackers to inject malicious scripts into error messages that are displayed to users. When exploited, this can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. Organizations running iTop versions before 2.7.13 or 3.2.2 are affected.

💻 Affected Systems

Products:
  • Combodo iTop
Versions: All versions prior to 2.7.13 and 3.2.2
Operating Systems: All platforms running iTop
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both iTop 2.x and 3.x branches. Requires user interaction with malicious error messages.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, administrative privilege escalation, data exfiltration, and full compromise of the iTop instance and connected systems.

🟠

Likely Case

Session hijacking, credential theft, unauthorized data access, and manipulation of iTop records by authenticated attackers.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to trigger an error with malicious content that gets displayed to users. Likely requires some level of access to create/modify records.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.13 or 3.2.2

Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-292c-hgcf-2g22

Restart Required: Yes

Instructions:

1. Backup your iTop instance and database. 2. Download the patched version from the official iTop repository. 3. Follow the iTop upgrade documentation for your version. 4. Apply the update files to your installation. 5. Run the setup/upgrade process. 6. Verify the installation works correctly.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources and mitigate XSS impact

Add to web server config: Content-Security-Policy: default-src 'self'; script-src 'self'

Input Validation Enhancement

all

Implement additional input validation for all user-controllable fields

Review and enhance validation in custom fields and extensions

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to limit script execution
  • Deploy a Web Application Firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check iTop version in the application interface or configuration files. Versions below 2.7.13 or 3.2.2 are vulnerable.

Check Version:

Check the 'itop/application/version.inc.php' file or the About page in the iTop interface

Verify Fix Applied:

After patching, verify the version shows 2.7.13 or higher (for 2.x) or 3.2.2 or higher (for 3.x). Test error message rendering with test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual error messages containing script tags or JavaScript code
  • Multiple failed validation attempts on fields
  • Suspicious user input patterns in application logs

Network Indicators:

  • HTTP requests containing script payloads in parameters
  • Unexpected external script loads in error pages

SIEM Query:

source="iTop_logs" AND ("<script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export