PT-2025-6113 · Unknown · Zoo-Project
Xbow-Security
·
Published
2025-02-10
·
Updated
2025-02-12
·
CVE-2025-25190
6.9
Medium
Base vector | Vector | AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
Name of the Vulnerable Software and Affected Versions:
ZOO-Project versions prior to commit 7a5ae1a
Description:
The ZOO-Project Web Processing Service (WPS) Server contains a Cross-Site Scripting (XSS) vulnerability in its EchoProcess service. The vulnerability exists because the EchoProcess service directly reflects user input in its output without proper sanitization when handling complex inputs. The service accepts various input formats including XML, JSON, and SVG, and returns the content based on the requested MIME type. When processing SVG content and returning it with the image/svg+xml MIME type, the server fails to sanitize potentially malicious JavaScript in attributes like `onload`, allowing arbitrary JavaScript execution in the victim's browser context.
Recommendations:
For ZOO-Project versions prior to commit 7a5ae1a, update to a version that includes the fix committed in 7a5ae1a to resolve the issue.
As a temporary workaround, consider disabling the EchoProcess service or restricting the handling of SVG content to minimize the risk of exploitation.
Avoid using the EchoProcess service with SVG inputs until the issue is resolved.
Exploit
Fix
XSS
Weakness Enumeration
Related Identifiers
Affected Products
References · 9
- 🔥 https://github.com/ZOO-Project/ZOO-Project/security/advisories/GHSA-2569-6r9f-j7jv⭐ 30 🔗 32 · Exploit
- https://osv.dev/vulnerability/CVE-2025-25190 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-25190 · Security Note
- https://github.com/ZOO-Project/ZOO-Project/commit/7a5ae1a10faa2f9877d18ec72550dc23e8ce1aac⭐ 30 🔗 32 · Note
- https://twitter.com/cybercronai/status/1889698640404336813 · Twitter Post
- https://twitter.com/CVETracker/status/1889404289715478564 · Twitter Post
- https://twitter.com/CVEnew/status/1889079662619369966 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1889120186365534390 · Twitter Post
- https://t.me/cvedetector/17613 · Telegram Post