Overview CVE-2025-62729 describes a Stored Cross-Site Scripting (XSS) vulnerability found in SOPlanning, a web-based planning and scheduling application. This vulnerability affects the /status endpoint. A malicious attacker with a valid SOPlanning account can inject arbitrary HTML and JavaScript code into the website, which will be stored and executed when other users access certain pages, leading to potential security breaches. Technical Details The vulnerability exists because the /status endpoint does not properly sanitize user-supplied input before storing it in the application’s database. An attacker can inject malicious scripts into a field accessible through the /status functionality. When another user views content…
-
-
Overview CVE-2025-62297 describes a Stored Cross-Site Scripting (XSS) vulnerability found in SOPlanning, a web-based project planning tool. This vulnerability affects the /projets endpoint. An attacker with medium privileges can inject malicious HTML and JavaScript code into the website. This code will be stored and executed whenever a user opens or edits the affected project page. This could lead to various malicious activities, including session hijacking, defacement, or redirection to phishing sites. Technical Details The Stored XSS vulnerability exists due to insufficient input sanitization and output encoding within the /projets endpoint of SOPlanning. Specifically, when creating or modifying a project, the…
-
Overview This article details a Stored Cross-Site Scripting (XSS) vulnerability, identified as CVE-2025-62296, affecting SOPlanning, a web-based scheduling and resource management application. The vulnerability resides within the /taches endpoint, allowing attackers with medium privileges to inject malicious HTML and JavaScript code into the application. This injected code is then executed whenever a user opens the affected editor within SOPlanning. Technical Details CVE-2025-62296 is a Stored XSS vulnerability. This means the malicious payload is permanently stored on the server (in the SOPlanning database in this case) and executed when other users interact with the compromised data. In this specific instance, an…
-
Overview This article details a Stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-62295 affecting SOPlanning, a web-based scheduling application. This vulnerability resides in the /groupe_form endpoint and could allow a malicious attacker with medium privileges to inject arbitrary HTML and JavaScript into the website. This injected code will be rendered/executed when another user opens the editor within SOPlanning. Users of SOPlanning are strongly advised to upgrade to version 1.55 to mitigate this risk. Technical Details CVE-2025-62295 is a Stored XSS vulnerability. This means that malicious JavaScript code can be permanently injected into the SOPlanning application’s database. Specifically, the /groupe_form endpoint…
-
Overview CVE-2025-62294 identifies a critical security vulnerability affecting SOPlanning, a popular web-based planning and scheduling software. The vulnerability stems from a weak implementation in the password recovery mechanism, specifically the predictable generation of password recovery tokens. This flaw allows a malicious attacker to potentially brute-force these tokens and gain unauthorized access to user accounts, leading to complete account takeover. Technical Details The core issue lies in the algorithm used to generate the password recovery tokens. Instead of using a cryptographically secure random number generator (CSPRNG) to produce unpredictable and unique tokens, SOPlanning’s affected versions relied on a weak, easily predictable…
-
Overview CVE-2025-62293 identifies a Broken Access Control vulnerability affecting SOPlanning, a web-based project planning tool. This vulnerability resides within the /status endpoint. Successful exploitation allows an authenticated attacker to add, edit, and delete project statuses, regardless of their intended permissions. This can lead to data manipulation, project disruption, and potentially unauthorized access to sensitive information. Technical Details The vulnerability stems from a lack of proper permission checks within the Project Status functionality. Specifically, the SOPlanning application fails to adequately verify if an authenticated user has the necessary privileges to modify project statuses. This allows any authenticated user, even those with…
-
Overview CVE-2025-60738 describes a critical security vulnerability affecting Ilevia EVE X1 Server. This vulnerability allows a remote attacker to execute arbitrary code on the affected server. The flaw resides within the ping.php component and stems from insufficient filtering of IP parameters. Specifically, versions of the firmware up to and including v4.7.18.0.eden, and logic versions up to and including v6.00 – 2025_07_21 are vulnerable. This vulnerability poses a significant risk to systems using the Ilevia EVE X1 Server. Technical Details The ping.php component, likely intended for network diagnostic purposes, fails to properly sanitize input provided through IP parameters. This lack of…
-
Overview CVE-2025-60737 details a Cross-Site Scripting (XSS) vulnerability affecting Ilevia EVE X1 Server Firmware versions up to and including 4.7.18.0.eden (Logic Version
-
Overview CVE-2025-36161 is a medium severity vulnerability affecting IBM Concert versions 1.0.0 through 2.0.0. This vulnerability stems from the failure to properly enable HTTP Strict-Transport-Security (HSTS). This omission allows a remote attacker to potentially intercept and obtain sensitive information through man-in-the-middle (MitM) attacks. Technical Details HTTP Strict-Transport-Security (HSTS) is a web security policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking. It allows a web server to declare that web browsers (or other complying user agents) should only interact with it using secure HTTPS connections, and never via the insecure HTTP…
-
Overview CVE-2025-34320 describes a critical security vulnerability affecting BASIS BBj versions prior to 25.00. This flaw allows an unauthenticated attacker to read arbitrary files from the system on which the BBj server is running. The vulnerability stems from improper input validation and path canonicalization within a Jetty-served web endpoint. Technical Details The vulnerability resides in a web endpoint served by the Jetty web server embedded within BASIS BBj. Due to insufficient input validation, an attacker can inject directory traversal sequences (e.g., ../) into the request path. This allows the attacker to bypass intended access restrictions and read files outside the…