CVE-2025-65237

6.1 MEDIUM

📋 TL;DR

This reflected cross-site scripting (XSS) vulnerability in OpenCode Systems USSD Gateway allows attackers to inject malicious JavaScript that executes in users' browsers. Attackers can steal session cookies, redirect users, or perform actions on their behalf. Organizations using OpenCode USSD Gateway OC Release 5 are affected.

💻 Affected Systems

Products:
  • OpenCode Systems USSD Gateway
Versions: OC Release 5
Operating Systems: Not specified, likely various
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web interface component of the USSD gateway.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, gain full control of the USSD gateway, manipulate USSD transactions, or compromise user data.

🟠

Likely Case

Session hijacking, credential theft, or phishing attacks against users accessing the vulnerable interface.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into clicking malicious links. Public proof-of-concept available in referenced GitBook.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not found

Restart Required: No

Instructions:

No official patch available. Implement workarounds and monitor vendor for updates.

🔧 Temporary Workarounds

Implement Web Application Firewall (WAF)

all

Deploy WAF with XSS protection rules to block malicious payloads.

Add Content Security Policy (CSP)

all

Implement strict CSP headers to restrict script execution sources.

Add HTTP header: Content-Security-Policy: default-src 'self'; script-src 'self'

🧯 If You Can't Patch

  • Isolate the USSD gateway behind a reverse proxy with input sanitization
  • Implement network segmentation to limit access to the vulnerable interface

🔍 How to Verify

Check if Vulnerable:

Test by injecting XSS payloads into input parameters and checking if they execute in browser.

Check Version:

Check product documentation or admin interface for version information.

Verify Fix Applied:

Verify that injected scripts no longer execute and input is properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long parameter values in web logs
  • Script tags or JavaScript in URL parameters

Network Indicators:

  • HTTP requests with suspicious parameters containing script tags or JavaScript

SIEM Query:

source="web_logs" AND (url="*<script*" OR param="*javascript:*")

🔗 References

📤 Share & Export