CVE-2025-60916

5.4 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in the /overview/network/ endpoint of Austrian Archaeological Institute Openatlas allows attackers to inject malicious scripts via the charge parameter. When exploited, this enables execution of arbitrary JavaScript in the victim's browser context, potentially compromising user sessions or performing unauthorized actions. This affects all Openatlas installations before version 8.12.0.

💻 Affected Systems

Products:
  • Austrian Archaeological Institute Openatlas
Versions: All versions before 8.12.0
Operating Systems: Any OS running Openatlas
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the /overview/network/ endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform account takeover, redirect users to malicious sites, or perform actions on behalf of authenticated users.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the application interface through injected content.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, though some user interface manipulation may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking a user into clicking a malicious link containing the crafted charge parameter payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.12.0

Vendor Advisory: https://www.sec4you-pentest.com/schwachstelle/openatlas-schwachstelle-reflected-dom-based-xss-charge/

Restart Required: Yes

Instructions:

1. Backup your Openatlas installation and database. 2. Download Openatlas version 8.12.0 or later from the official repository. 3. Replace the existing installation with the patched version. 4. Restart the web server service.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rule

all

Implement WAF rules to block malicious charge parameter payloads containing script tags or JavaScript.

Input Validation Filter

all

Add server-side validation to sanitize or reject malicious input in the charge parameter.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources.
  • Disable or restrict access to the /overview/network/ endpoint if not required.

🔍 How to Verify

Check if Vulnerable:

Test by accessing the /overview/network/ endpoint with a charge parameter containing a simple XSS payload like <script>alert('test')</script> and check if it executes.

Check Version:

Check the Openatlas version in the application's admin interface or configuration files.

Verify Fix Applied:

After patching, repeat the vulnerability test; the payload should be properly sanitized and not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual or malicious patterns in charge parameter values in web server access logs.

Network Indicators:

  • HTTP requests to /overview/network/ with suspicious charge parameter content.

SIEM Query:

source="web_server_logs" AND uri_path="/overview/network/" AND (query_string="*charge=*<script>*" OR query_string="*charge=*javascript:*")

🔗 References

📤 Share & Export