FKIE_CVE-2025-1888
Vulnerability from fkie_nvd - Published: 2025-03-14 17:15 - Updated: 2025-03-14 17:15
Severity ?
Summary
The Leica Web Viewer within the Aperio Eslide Manager Application is vulnerable to reflected cross-site scripting (XSS). An authenticated user can access the slides within a project and injecting malicious JavaScript into the "memo" field. The memo field has a hover over action that will display a Microsoft Tool Tip which a user can use to quickly view the memo associated with the slide and execute the JavaScript.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Leica Web Viewer within the Aperio Eslide Manager Application is vulnerable to reflected cross-site scripting (XSS). An authenticated user can access the slides within a project and injecting malicious JavaScript into the \"memo\" field. The memo field has a hover over action that will display a Microsoft Tool Tip which a user can use to quickly view the memo associated with the slide and execute the JavaScript."
},
{
"lang": "es",
"value": "Leica Web Viewe de la aplicaci\u00f3n Aperio Eslide Manager es vulnerable a ataques de cross-site scripting (XSS). Un usuario autenticado puede acceder a las diapositivas de un proyecto e inyectar JavaScript malicioso en el campo \"memo\". Al pasar el cursor sobre el campo \"memo\", se muestra una informaci\u00f3n sobre herramientas de Microsoft que permite al usuario ver r\u00e1pidamente la nota asociada a la diapositiva y ejecutar el JavaScript."
}
],
"id": "CVE-2025-1888",
"lastModified": "2025-03-14T17:15:50.807",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5,
"source": "cves@blacklanternsecurity.com",
"type": "Secondary"
}
]
},
"published": "2025-03-14T17:15:50.807",
"references": [
{
"source": "cves@blacklanternsecurity.com",
"url": "https://blog.blacklanternsecurity.com/p/cve-2025-1888reflected-xss-in-aperio"
}
],
"sourceIdentifier": "cves@blacklanternsecurity.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "cves@blacklanternsecurity.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…