CVE-2025-62295

5.4 MEDIUM

📋 TL;DR

SOPlanning versions before 1.55 contain a stored cross-site scripting (XSS) vulnerability in the /groupe_form endpoint. Attackers with medium privileges can inject malicious HTML and JavaScript that executes when users open the editor, potentially compromising user sessions or performing unauthorized actions. This affects all SOPlanning deployments using vulnerable versions.

💻 Affected Systems

Products:
  • SOPlanning
Versions: All versions before 1.55
Operating Systems: All platforms running SOPlanning
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have medium privileges (authenticated user with group management access).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, deface the application, or redirect users to malicious sites, potentially leading to complete system compromise.

🟠

Likely Case

Attackers with medium privileges steal session cookies or credentials from other users, perform unauthorized actions on their behalf, or deploy client-side malware.

🟢

If Mitigated

With proper input validation and output encoding, the attack surface is reduced, but the vulnerability still exists in the codebase.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Stored XSS vulnerabilities are commonly exploited and require only medium privileges. The attack vector is straightforward for attackers with basic web security knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.55

Vendor Advisory: https://www.soplanning.org/en/

Restart Required: Yes

Instructions:

1. Backup your SOPlanning installation and database. 2. Download version 1.55 from the official SOPlanning website. 3. Replace the existing installation with the new version. 4. Restart your web server. 5. Verify the update was successful.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize HTML/JavaScript in group form submissions

Implement input sanitization in /groupe_form endpoint processing

Content Security Policy

all

Implement strict CSP headers to mitigate XSS impact

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to HTTP headers

🧯 If You Can't Patch

  • Restrict access to group management functions to trusted administrators only
  • Implement web application firewall (WAF) rules to block XSS payloads in group form submissions

🔍 How to Verify

Check if Vulnerable:

Check if SOPlanning version is below 1.55 by examining the application footer or version files

Check Version:

Check the footer of SOPlanning web interface or examine the application's version file

Verify Fix Applied:

After updating to version 1.55, test the /groupe_form endpoint with basic XSS payloads to ensure they are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /groupe_form with script tags or JavaScript code
  • Multiple failed login attempts followed by group management activities

Network Indicators:

  • HTTP requests containing script tags or JavaScript in group form parameters
  • Unusual outbound connections from SOPlanning to external domains

SIEM Query:

source="web_server" AND (url="/groupe_form" AND (body="<script>" OR body="javascript:"))

🔗 References

📤 Share & Export