CVE-2025-59763

6.1 MEDIUM

📋 TL;DR

This reflected cross-site scripting (XSS) vulnerability in AndSoft's e-TMS allows attackers to inject malicious JavaScript via specially crafted URLs containing malicious parameters. When victims click these links, the attacker can steal session cookies, redirect users, or perform actions on their behalf. Organizations using AndSoft e-TMS v25.03 are affected.

💻 Affected Systems

Products:
  • AndSoft e-TMS
Versions: v25.03
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the login form component accessible via '/clt/LOGINFRM_EK.ASP' with specific parameters.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, gain full system access, compromise sensitive data, and pivot to other systems.

🟠

Likely Case

Attackers steal user session cookies to impersonate legitimate users, access their data, and perform unauthorized actions within the application.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before reaching user browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited via phishing emails or malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v25.04 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/update-24092025-multiple-vulnerabilities-andsofts-e-tms

Restart Required: Yes

Instructions:

1. Download the latest version from AndSoft's official website. 2. Backup current installation. 3. Install the update following vendor instructions. 4. Restart the application server.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Configure WAF to block requests containing malicious script patterns in the vulnerable parameters.

Input Validation Filter

windows

Implement server-side input validation to sanitize the 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources.
  • Monitor and block suspicious URLs containing the vulnerable parameters in web server logs.

🔍 How to Verify

Check if Vulnerable:

Test by accessing the login form with a harmless payload like 'test' in the vulnerable parameters and check if it reflects unsanitized.

Check Version:

Check the application's about page or configuration files for version information.

Verify Fix Applied:

After patching, test with the same payload to confirm it's properly encoded or blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to '/clt/LOGINFRM_EK.ASP' with suspicious parameter values containing script tags or JavaScript code.

Network Indicators:

  • Unusual redirects from the login page, unexpected JavaScript execution in browser traffic.

SIEM Query:

source="web_server" AND uri="/clt/LOGINFRM_EK.ASP" AND (param="l" OR param="demo" OR param="demo2" OR param="TNTLOGIN" OR param="UO" OR param="SuppConn") AND value CONTAINS "<script>"

🔗 References

📤 Share & Export