CVE-2025-60249

6.4 MEDIUM

📋 TL;DR

CVE-2025-60249 is a cross-site scripting (XSS) vulnerability in vulnerability-lookup 2.16.0 that allows authenticated users to inject malicious JavaScript when creating bundles, comments, or sightings. This could lead to session hijacking, data theft, or unauthorized actions within the application. Only users with permissions to add these items on a vulnerability-lookup instance are affected.

💻 Affected Systems

Products:
  • vulnerability-lookup
Versions: 2.16.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only instances where users can create bundles, comments, or sightings are vulnerable. Requires authenticated user access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin session cookies, perform account takeover, manipulate vulnerability data, or redirect users to malicious sites.

🟠

Likely Case

Attackers with user accounts could perform session hijacking against other users, steal sensitive data displayed in the application, or deface the interface.

🟢

If Mitigated

With proper input validation and output encoding, the risk is limited to minor data integrity issues.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of the application's input fields. No public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit afa12347f1461d9481eba75ac19897e80a9c7434

Vendor Advisory: https://github.com/vulnerability-lookup/vulnerability-lookup/commit/afa12347f1461d9481eba75ac19897e80a9c7434

Restart Required: No

Instructions:

1. Update to the latest vulnerability-lookup version. 2. Apply the fix from commit afa12347f1461d9481eba75ac19897e80a9c7434. 3. Verify that innerHTML usage has been replaced with safer DOM methods and input validation is improved.

🔧 Temporary Workarounds

Input Sanitization

all

Implement server-side input validation and output encoding for all user-supplied data in bundles, comments, and sightings.

🧯 If You Can't Patch

  • Restrict user permissions to only trusted users who can create bundles, comments, or sightings.
  • Implement a web application firewall (WAF) with XSS protection rules.

🔍 How to Verify

Check if Vulnerable:

Check if running vulnerability-lookup version 2.16.0 and review code for unsafe innerHTML usage in bundle.py, comment.py, and user.py.

Check Version:

Check the application's version in the web interface or configuration files.

Verify Fix Applied:

Verify that the fix commit afa12347f1461d9481eba75ac19897e80a9c7434 is applied and test XSS payloads in bundle, comment, and sighting creation fields.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript or HTML patterns in bundle, comment, or sighting creation logs
  • Multiple failed XSS attempts

Network Indicators:

  • Suspicious POST requests to bundle, comment, or sighting endpoints with script tags

SIEM Query:

source="vulnerability-lookup" AND (event="bundle_create" OR event="comment_create" OR event="sighting_create") AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export