CVE-2025-59755

6.1 MEDIUM

📋 TL;DR

This reflected cross-site scripting (XSS) vulnerability in AndSoft's e-TMS v25.03 allows attackers to execute malicious JavaScript in victims' browsers by tricking them into visiting specially crafted URLs. The vulnerability affects users of the e-TMS web interface who click on malicious links containing payloads in specific parameters.

💻 Affected Systems

Products:
  • AndSoft e-TMS
Versions: v25.03
Operating Systems: Windows (ASP-based application)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default installation of e-TMS v25.03 web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on client systems.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the application interface through injected content.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though some client-side risks remain.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited with simple malicious URLs that don't require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/update-24092025-multiple-vulnerabilities-andsofts-e-tms

Restart Required: No

Instructions:

1. Monitor AndSoft vendor website for security updates. 2. Apply any available patches for e-TMS v25.03. 3. Test in non-production environment before deployment.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block XSS payloads in URL parameters

Input Validation Filter

windows

Implement server-side input validation for the vulnerable parameters

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Deploy network segmentation to limit access to vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Test by accessing /clt/LOGINFRM_CAT.ASP with XSS payloads in l, demo, demo2, TNTLOGIN, UO, or SuppConn parameters

Check Version:

Check e-TMS version in application interface or configuration files

Verify Fix Applied:

Verify that XSS payloads in vulnerable parameters are properly sanitized or blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values in /clt/LOGINFRM_CAT.ASP requests
  • JavaScript patterns in URL parameters

Network Indicators:

  • HTTP requests with suspicious script tags or JavaScript in query parameters

SIEM Query:

source="web_server" AND uri="/clt/LOGINFRM_CAT.ASP" AND (query CONTAINS "<script>" OR query CONTAINS "javascript:")

🔗 References

📤 Share & Export