CVE-2025-55072

5.4 MEDIUM

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in desknet's NEO allows attackers to inject malicious JavaScript that executes in users' browsers when viewing affected content. This affects all users of desknet's NEO versions V2.0R1.0 through V9.0R2.0 who access the vulnerable interface.

💻 Affected Systems

Products:
  • desknet's NEO
Versions: V2.0R1.0 to V9.0R2.0
Operating Systems: All supported OS for desknet's NEO
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable unless specifically patched.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware via drive-by downloads.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the application interface through injected content.

🟢

If Mitigated

Limited to content manipulation within the application interface if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH if the vulnerable interface is exposed to the internet, as attackers can target any user accessing the application.
🏢 Internal Only: MEDIUM as internal attackers or compromised accounts could still exploit the vulnerability to escalate privileges or move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the ability to inject malicious content into the application, which typically requires some level of access or user interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after V9.0R2.0 (check vendor advisory for specific fixed version)

Vendor Advisory: https://www.desknets.com/neo/support/mainte/17475/

Restart Required: No

Instructions:

1. Review the vendor advisory at the provided URL. 2. Apply the latest security update from desknet's NEO. 3. Verify the update was successful by checking the version number.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add a Content Security Policy header to restrict script execution to trusted sources only.

Add 'Content-Security-Policy: script-src 'self';' to HTTP headers

Input Validation and Output Encoding

all

Implement server-side validation of user input and encode all output before rendering in the browser.

🧯 If You Can't Patch

  • Restrict user permissions to minimize who can inject content into the application.
  • Implement web application firewall (WAF) rules to block common XSS payloads.

🔍 How to Verify

Check if Vulnerable:

Check if your desknet's NEO version falls within V2.0R1.0 to V9.0R2.0 using the version check command.

Check Version:

Check the application's admin interface or configuration files for version information specific to desknet's NEO.

Verify Fix Applied:

Confirm the version is updated beyond V9.0R2.0 and test for XSS by attempting to inject simple alert payloads in user-controllable fields.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript or HTML patterns in user input logs
  • Multiple failed login attempts from unexpected locations following content injection

Network Indicators:

  • Unexpected outbound connections to external domains from user browsers accessing the application

SIEM Query:

source="desknet_neo_logs" AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export