CVE-2025-66420

5.4 MEDIUM

📋 TL;DR

This vulnerability allows cross-site scripting (XSS) attacks through HTML attachments in Tryton's web client (sao). Attackers can inject malicious scripts that execute in users' browsers when viewing attachments. All Tryton users with web access to affected versions are potentially impacted.

💻 Affected Systems

Products:
  • Tryton sao (tryton-sao)
Versions: Versions before 7.6.9, 7.4.19, 7.0.38, and 6.0.67
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Tryton installations with web access enabled and HTML attachment functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, or redirect users to malicious sites, potentially leading to account compromise or data theft.

🟠

Likely Case

Attackers could perform limited session hijacking or credential theft from users who open malicious HTML attachments.

🟢

If Mitigated

With proper content security policies and attachment filtering, impact is limited to isolated user sessions without broader system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening malicious HTML attachment) and typically authenticated access to upload attachments.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.9, 7.4.19, 7.0.38, or 6.0.67 depending on your branch

Vendor Advisory: https://discuss.tryton.org/t/security-release-for-issue-14290/8895

Restart Required: Yes

Instructions:

1. Identify your Tryton version. 2. Upgrade to the patched version for your branch. 3. Restart Tryton services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable HTML attachments

all

Configure Tryton to block or sanitize HTML file uploads

Implement Content Security Policy

all

Add CSP headers to prevent script execution from untrusted sources

🧯 If You Can't Patch

  • Implement strict file upload filtering to block HTML attachments
  • Educate users about risks of opening untrusted attachments

🔍 How to Verify

Check if Vulnerable:

Check Tryton version against affected versions list

Check Version:

Check Tryton configuration files or admin interface for version information

Verify Fix Applied:

Confirm version is 7.6.9, 7.4.19, 7.0.38, or 6.0.67 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML file uploads
  • Multiple failed attachment upload attempts

Network Indicators:

  • Suspicious file uploads to attachment endpoints

SIEM Query:

source="tryton" AND (event="file_upload" AND file_extension="html")

🔗 References

📤 Share & Export