CVE-2025-64030

5.4 MEDIUM

📋 TL;DR

Eximbills Enterprise 4.1.5 is vulnerable to authenticated stored cross-site scripting (XSS) where malicious JavaScript can be injected via the TMPL_INFO parameter and executed in other users' browsers. This affects organizations using Eximbills Enterprise 4.1.5 (built October 30, 2020) with authenticated users. Attackers can steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • Eximbills Enterprise
Versions: 4.1.5 (built 2020-10-30)
Operating Systems: All platforms running Eximbills
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the /EximBillWeb/servlets/WSTrxManager endpoint. All deployments with this specific build date are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could steal administrator session cookies, gain full system access, pivot to internal systems, and compromise the entire Eximbills environment and connected systems.

🟠

Likely Case

Attackers steal user session cookies to impersonate legitimate users, access sensitive billing data, modify transactions, or redirect users to phishing sites.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute JavaScript, limiting impact to data corruption at most.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Public proof-of-concept exists in Medium article. Exploitation requires authenticated access but is trivial once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://chinasystems.com/whatwedo/ee

Restart Required: No

Instructions:

1. Contact China Systems for patch availability. 2. If patch exists, download from vendor portal. 3. Apply patch following vendor instructions. 4. Test functionality after patching.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize TMPL_INFO parameter by removing or encoding HTML/JavaScript special characters.

Implement input validation in WSTrxManager servlet to sanitize TMPL_INFO parameter

Output Encoding

all

Apply proper output encoding when rendering user-controlled data to prevent JavaScript execution.

Encode TMPL_INFO data using HTML entity encoding before rendering in responses

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in TMPL_INFO parameter
  • Restrict access to /EximBillWeb/servlets/WSTrxManager endpoint to only necessary users

🔍 How to Verify

Check if Vulnerable:

Test by submitting <script>alert('XSS')</script> in TMPL_INFO parameter to /EximBillWeb/servlets/WSTrxManager endpoint and checking if script executes when viewed by other users.

Check Version:

Check application version in admin interface or build date in application metadata

Verify Fix Applied:

After remediation, test with same XSS payload - JavaScript should not execute and payload should be displayed as plain text or removed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /EximBillWeb/servlets/WSTrxManager with script tags in parameters
  • Multiple failed login attempts followed by successful authentication and XSS payload submission

Network Indicators:

  • HTTP requests containing <script> tags in TMPL_INFO parameter
  • Unusual outbound connections from Eximbills server after XSS execution

SIEM Query:

source="eximbills" AND (uri_path="/EximBillWeb/servlets/WSTrxManager" AND (param="TMPL_INFO" AND value CONTAINS "<script>"))

🔗 References

📤 Share & Export