<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T02:20:45.448343+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8f87d67d-6ea7-4969-9975-cf9f6dd17020/export</id>
    <title>8f87d67d-6ea7-4969-9975-cf9f6dd17020</title>
    <updated>2026-05-11T02:20:45.833540+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8f87d67d-6ea7-4969-9975-cf9f6dd17020", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-65417", "type": "seen", "source": "https://gist.github.com/ZeroBreach-GmbH/906ec04806f62d61c65b1c90b0f36c4a", "content": "##### Description\n\nA reflected cross-site scripting (XSS) vulnerability exists in the web application. Unsanitized user input is directly reflected in the application's response without proper encoding, allowing attackers to inject and execute arbitrary JavaScript code in the victim's browser.\n\n##### Details\n\n*   **Product:** docuForm FSM Client\n*   **Affected Versions:** 11.11c\n*   **Vulnerability Type:** CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n*   **Risk Level:** High - CVSS 3.1: 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)\n*   **Vendor URL:** www.docuform.de\n*   **Vendor acknowledged vulnerability:** Yes\n*   **CVE:** CVE-2025-65417\n\n##### Impact\n\nSuccessful exploitation allows attackers to execute scripts in the victim's browser context with the application's privileges. This can lead to session hijacking by stealing cookies, theft of sensitive data like credentials or personal information, unauthorized actions on behalf of the user or redirection to malicious sites for malware distribution.\n\n##### References\n\n*   [National Vulnerability Database CVE-2025-65417](https://nvd.nist.gov/vuln/detail/CVE-2025-65417)\n*   [ZeroBreach GmbH - CVE-2025-65417](https://zerobreach.de/blog/security-advisories/CVE-2025-65417.html)\n\n##### Timeline\n\n*   **2025-10:** Vulnerability reported to the vendor.\n*   **2025-11:** Vendor published a fix for the issue.\n*   **2026-04:** Information about the vulnerability is published.\n\n##### Credits\n\n*   Bastian Recktenwald ([Bastian.Recktenwald@ZeroBreach.de](mailto:Bastian.Recktenwald@ZeroBreach.de))", "creation_timestamp": "2026-05-05T15:18:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8f87d67d-6ea7-4969-9975-cf9f6dd17020/export"/>
    <published>2026-05-05T15:18:00+00:00</published>
  </entry>
</feed>
