Description
A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in DSpace JSPUI 6.5 within the search/discover filtering functionality. The vulnerability exists due to improper sanitization of user-supplied input via the filter_type_1 parameter.
Published: 2026-03-27
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (Reflected)
Action: Apply Fix
AI Analysis

Impact

A reflected cross‑site scripting flaw allows an attacker to inject malicious script into the response returned by DSpace JSPUI 6.5 when a user submits a specially crafted search query. The vulnerability arises from the lack of proper sanitization of the filter_type_1 parameter, causing any input containing script code to be rendered by the browser and executed in the context of the authenticated or non‑authenticated user’s session. This could enable attackers to steal session cookies, perform account takeover, or deface the application.

Affected Systems

The affected product is DSpace JSPUI version 6.5. No other vendor or product variants are listed. Users running this version of the JSP user interface should review the impact on their installations.

Risk and Exploitability

The vulnerability is of moderate to high risk because it is easily triggerable via a URL and does not require privileged access. While no CVSS score or EPSS value is supplied, the existence of a reflected XSS suggests a potential for widespread exploitation through phishing or compromised search queries. The flaw is not listed in the CISA KEV catalog, indicating no confirmed exploitation yet, but the risk remains inherent to the vulnerability’s nature. Potential attackers could simply craft a malicious link to a DSpace search page containing a forbidden filter_type_1 value and distribute it to users. Given the lack of an official patch, the risk persists until mitigation steps are applied.

Generated by OpenCVE AI on March 27, 2026 at 15:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the DSpace project website or support channel for a patch or update to JSPUI 6.5
  • Apply the latest available DSpace JSPUI release and verify that the filter_type_1 parameter is sanitized

Generated by OpenCVE AI on March 27, 2026 at 15:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in DSpace JSPUI 6.5 within the search/discover filtering functionality. The vulnerability exists due to improper sanitization of user-supplied input via the filter_type_1 parameter.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-27T14:30:17.430Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61190

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T15:16:45.750

Modified: 2026-03-27T15:16:45.750

Link: CVE-2025-61190

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T15:47:17Z

Weaknesses

No weakness.