CVE-2025-59715

4.8 MEDIUM

📋 TL;DR

This reflected cross-site scripting (XSS) vulnerability in SMSEagle allows attackers to inject malicious scripts via username or contact phone number fields. When users interact with these fields, the scripts execute in their browser context, potentially stealing session cookies or performing unauthorized actions. All SMSEagle installations before version 6.11 are affected.

💻 Affected Systems

Products:
  • SMSEagle
Versions: All versions before 6.11
Operating Systems: All supported SMSEagle OS versions
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web interface where username and contact phone number inputs are reflected without proper sanitization.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, gain full administrative access to the SMSEagle device, send unauthorized SMS messages, modify configurations, or pivot to internal networks.

🟠

Likely Case

Attackers would typically steal session cookies to impersonate legitimate users, potentially sending unauthorized SMS messages or accessing limited functionality based on the compromised account's privileges.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction with malicious links containing the XSS payload. The attacker needs to trick a user into clicking a specially crafted link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.11

Vendor Advisory: https://www.smseagle.eu/security-advisory/resolved-xss-in-smseagle-software-6-11/

Restart Required: No

Instructions:

1. Log into SMSEagle web interface as administrator. 2. Navigate to System > Update. 3. Check for available updates. 4. Apply update to version 6.11 or later. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Input Validation Web Application Firewall Rule

all

Deploy WAF rules to block requests containing XSS payload patterns in username and phone number parameters

Content Security Policy Implementation

all

Implement strict CSP headers to prevent inline script execution and restrict script sources

🧯 If You Can't Patch

  • Restrict SMSEagle web interface access to trusted IP addresses only using firewall rules
  • Implement additional authentication layers and monitor for suspicious login attempts

🔍 How to Verify

Check if Vulnerable:

Check SMSEagle version in web interface under System > About. If version is below 6.11, the system is vulnerable.

Check Version:

No CLI command available. Check via web interface at System > About or via API if configured.

Verify Fix Applied:

After updating, verify version is 6.11 or higher and test username/phone fields with basic XSS payloads like <script>alert('test')</script> to ensure they're properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual login attempts following suspicious URL parameters
  • Multiple failed login attempts with malformed usernames containing script tags

Network Indicators:

  • HTTP requests containing script tags or JavaScript in username/phone parameters
  • Unusual outbound connections following user interaction with SMSEagle

SIEM Query:

source="smseagle" AND (uri="*<script*" OR uri="*javascript:*" OR user_agent="*<script*")

🔗 References

📤 Share & Export