OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content within the Annual Report Enterprise Banner image upload field. Injected content is executed in the context of other users when they generate an Annual Report. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opexus
Opexus foiaxpress |
|
Vendors & Products |
Opexus
Opexus foiaxpress |
Tue, 07 Oct 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content within the Annual Report Enterprise Banner image upload field. Injected content is executed in the context of other users when they generate an Annual Report. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data. | |
Title | OPEXUS FOIAXpress stored XSS via banner image | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisa-cg
Published: 2025-10-07T23:13:54.801Z
Updated: 2025-10-07T23:13:54.801Z
Reserved: 2025-10-07T14:14:03.698Z
Link: CVE-2025-61997

No data.

Status : Received
Published: 2025-10-08T00:15:34.070
Modified: 2025-10-08T00:15:34.070
Link: CVE-2025-61997

No data.