CVE-2025-67078

6.1 MEDIUM

📋 TL;DR

A cross-site scripting (XSS) vulnerability in Omnispace Agora Project allows attackers to inject malicious scripts via the notify parameter in the file controller's error display functionality. This affects all users of Agora Project versions before 25.10, potentially compromising user sessions and data.

💻 Affected Systems

Products:
  • Omnispace Agora Project
Versions: All versions before 25.10
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the file controller's error notification functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or install malware via drive-by downloads.

🟠

Likely Case

Session hijacking, credential theft, or defacement of application pages through injected content.

🟢

If Mitigated

Limited impact with proper content security policies, input validation, and output encoding in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity and can be exploited without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.10

Vendor Advisory: https://www.agora-project.net

Restart Required: Yes

Instructions:

1. Backup current installation and data. 2. Download Agora Project version 25.10 or later. 3. Follow vendor upgrade instructions. 4. Restart the application service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize the notify parameter before processing.

# Add input validation in file controller
# Example: sanitize notify parameter
$notify = htmlspecialchars($_GET['notify'], ENT_QUOTES, 'UTF-8');

Content Security Policy

all

Implement CSP headers to restrict script execution sources.

# Add to web server configuration or application headers
Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
# For Apache: add to .htaccess or virtual host config
# For Nginx: add to server block

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in the notify parameter.
  • Disable or restrict access to the vulnerable file controller endpoint if not essential.

🔍 How to Verify

Check if Vulnerable:

Test by injecting a simple XSS payload into the notify parameter of the file controller error endpoint and check if it executes.

Check Version:

# Check Agora Project version
# Typically in admin panel or via application logs
# Or check version file if exists: cat /path/to/agora/version.txt

Verify Fix Applied:

After patching, attempt the same XSS payload injection and verify it does not execute and is properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual notify parameter values containing script tags or JavaScript in file controller logs
  • Multiple error requests with suspicious notify parameter content

Network Indicators:

  • HTTP requests to file controller with notify parameter containing script tags or encoded payloads

SIEM Query:

source="web_logs" | search "notify=*script*" OR "notify=*javascript*" | stats count by src_ip, uri

🔗 References

📤 Share & Export