OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content within the Annual Report Enterprise Banner image upload field. Injected content is executed in the context of other users when they generate an Annual Report. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opexus
Opexus foiaxpress |
|
Vendors & Products |
Opexus
Opexus foiaxpress |
Tue, 07 Oct 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content within the Annual Report Enterprise Banner image upload field. Injected content is executed in the context of other users when they generate an Annual Report. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data. | |
Title | OPEXUS FOIAXpress stored XSS via banner image | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2025-10-07T23:13:54.801Z
Reserved: 2025-10-07T14:14:03.698Z
Link: CVE-2025-61997

No data.

Status : Awaiting Analysis
Published: 2025-10-08T00:15:34.070
Modified: 2025-10-08T19:38:09.863
Link: CVE-2025-61997

No data.

Updated: 2025-10-08T13:35:02Z