CVE-2025-62297

5.4 MEDIUM

📋 TL;DR

SOPlanning web application is vulnerable to stored cross-site scripting (XSS) in the /projets endpoint. An attacker with medium privileges can inject malicious HTML and JavaScript that executes when other users view the compromised project pages. This affects all SOPlanning installations below version 1.55.

💻 Affected Systems

Products:
  • SOPlanning
Versions: All versions before 1.55
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have medium privileges (ability to edit projects).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals session cookies, performs account takeover, redirects users to malicious sites, or performs actions on behalf of authenticated users.

🟠

Likely Case

Attacker defaces project pages, steals session data from users viewing compromised pages, or performs limited client-side attacks.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with project editing permissions. XSS payloads are well-documented and easy to craft.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.55

Vendor Advisory: https://www.soplanning.org/en/

Restart Required: Yes

Instructions:

1. Backup current SOPlanning installation and database. 2. Download version 1.55 from official website. 3. Replace existing files with new version. 4. Restart web server. 5. Verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize HTML/JS in project data

Modify /projets endpoint code to sanitize user input using HTML entity encoding

Content Security Policy

all

Implement CSP headers to restrict script execution

Add 'Content-Security-Policy: script-src 'self'' to HTTP headers

🧯 If You Can't Patch

  • Restrict project editing permissions to trusted administrators only
  • Implement web application firewall (WAF) rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check SOPlanning version in admin panel or by examining source files. If version < 1.55, system is vulnerable.

Check Version:

Check admin dashboard or examine version.txt in installation directory

Verify Fix Applied:

After upgrading to 1.55, test XSS payload injection in project fields - scripts should be rendered as text, not executed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual project edits by medium-privilege users
  • HTML/JS patterns in project data fields

Network Indicators:

  • HTTP POST requests to /projets with script tags or JavaScript code

SIEM Query:

source="web_logs" AND uri="/projets" AND (method="POST" OR method="PUT") AND (content CONTAINS "<script>" OR content CONTAINS "javascript:")

🔗 References

📤 Share & Export