OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content as a URL within the Technical Support Hyperlink Manager. Injected content is executed in the context of other users when they click the malicious link. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opexus
Opexus foiaxpress |
|
Vendors & Products |
Opexus
Opexus foiaxpress |
Tue, 07 Oct 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content as a URL within the Technical Support Hyperlink Manager. Injected content is executed in the context of other users when they click the malicious link. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data. | |
Title | OPEXUS FOIAXpress stored XSS via Hyperlink Manager | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2025-10-07T23:14:16.924Z
Reserved: 2025-10-07T14:14:09.854Z
Link: CVE-2025-61998

No data.

Status : Awaiting Analysis
Published: 2025-10-08T00:15:34.220
Modified: 2025-10-08T19:38:09.863
Link: CVE-2025-61998

No data.

Updated: 2025-10-08T13:35:09Z