CVE-2025-61997

4.3 MEDIUM

📋 TL;DR

OPEXUS FOIAXpress versions before 11.13.3.0 contain a stored cross-site scripting (XSS) vulnerability in the Annual Report Enterprise Banner image upload field. Administrative users can inject malicious JavaScript that executes when other users generate Annual Reports, potentially allowing session hijacking, credential theft, or data exfiltration. This affects all organizations using vulnerable versions of FOIAXpress.

💻 Affected Systems

Products:
  • OPEXUS FOIAXpress
Versions: All versions before 11.13.3.0
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative privileges to exploit. Vulnerability exists in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrative user steals session cookies and credentials of other users, gains full access to their accounts, exfiltrates sensitive FOIA data, and potentially compromises the entire FOIAXpress system.

🟠

Likely Case

Administrative user with malicious intent steals session cookies of targeted users, accesses their accounts without authorization, and views or modifies FOIA request data.

🟢

If Mitigated

Limited impact due to strict administrative access controls, regular monitoring, and prompt patch application.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrative access to the FOIAXpress system. The attacker must have knowledge of the vulnerable field and ability to upload malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.13.3.0

Vendor Advisory: https://docs.opexustech.com/docs/foiaxpress/11.13.0/FOIAXpress_Release_Notes_11.13.3.0.pdf

Restart Required: No

Instructions:

1. Download FOIAXpress version 11.13.3.0 from OPEXUS support portal. 2. Backup current installation and database. 3. Run the upgrade installer following OPEXUS documentation. 4. Verify successful upgrade and functionality.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative accounts to only trusted personnel and implement strict access controls.

Input Validation Enhancement

all

Implement additional input validation on the Annual Report Enterprise Banner field to reject JavaScript content.

🧯 If You Can't Patch

  • Implement strict monitoring of administrative user activities and Annual Report generation logs.
  • Apply Content Security Policy (CSP) headers to mitigate XSS impact if supported by the application.

🔍 How to Verify

Check if Vulnerable:

Check FOIAXpress version in administration panel. If version is below 11.13.3.0, the system is vulnerable.

Check Version:

Check version in FOIAXpress web interface under Administration > System Information

Verify Fix Applied:

After upgrading to 11.13.3.0, verify version in administration panel and test the Annual Report Enterprise Banner field for XSS payload rejection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative user activity in Annual Report module
  • Multiple failed XSS payload attempts in web server logs
  • Unexpected JavaScript content in Annual Report generation requests

Network Indicators:

  • Unusual outbound connections from FOIAXpress server during Annual Report generation
  • Suspicious data exfiltration patterns

SIEM Query:

source="foiaxpress_logs" AND (event="AnnualReportBannerUpload" OR event="AnnualReportGenerate") AND (message="*script*" OR message="*javascript*")

🔗 References

📤 Share & Export