OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to upload JavaScript or other content embedded in an SVG image used as a logo. Injected content is executed in the context of other users when they view affected pages. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opexus
Opexus foiaxpress |
|
Vendors & Products |
Opexus
Opexus foiaxpress |
Tue, 07 Oct 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to upload JavaScript or other content embedded in an SVG image used as a logo. Injected content is executed in the context of other users when they view affected pages. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data. | |
Title | OPEXUS FOIAXpress stored XSS via logo image | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2025-10-07T23:14:38.171Z
Reserved: 2025-10-07T14:14:16.300Z
Link: CVE-2025-61999

No data.

Status : Awaiting Analysis
Published: 2025-10-08T00:15:34.373
Modified: 2025-10-08T19:38:09.863
Link: CVE-2025-61999

No data.

Updated: 2025-10-08T13:35:09Z