CVE-2025-54760

5.4 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in desknet's NEO allows attackers to inject malicious JavaScript that executes in users' browsers when viewing affected content. All users of vulnerable desknet's NEO versions are affected, potentially leading to session hijacking or unauthorized actions.

💻 Affected Systems

Products:
  • desknet's NEO
Versions: V9.0R2.0 and earlier
Operating Systems: All platforms running desknet's NEO
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware via drive-by downloads.

🟠

Likely Case

Session hijacking leading to unauthorized access to sensitive data within the desknet's NEO application.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though some functionality disruption may occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to inject malicious content into stored data that will be rendered to other users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version newer than V9.0R2.0

Vendor Advisory: https://www.desknets.com/neo/support/mainte/17475/

Restart Required: No

Instructions:

1. Download latest version from desknet's website. 2. Follow vendor upgrade instructions. 3. Verify successful update.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources

Add 'Content-Security-Policy' header with appropriate directives

Input Validation Filter

all

Implement server-side input validation to reject malicious scripts

Implement input sanitization for all user-controllable fields

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with XSS protection rules
  • Disable JavaScript execution in affected components if possible

🔍 How to Verify

Check if Vulnerable:

Check desknet's NEO version in administration panel or configuration files

Check Version:

Check version in NEO administration interface or consult vendor documentation

Verify Fix Applied:

Verify version is newer than V9.0R2.0 and test XSS payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript in user-submitted content
  • Multiple failed XSS attempts

Network Indicators:

  • Suspicious JavaScript payloads in HTTP requests
  • Unexpected external script loads

SIEM Query:

source="desknet_neo" AND (http_request contains "<script>" OR http_request contains "javascript:")

🔗 References

📤 Share & Export