VYPR
Low severity3.5NVD Advisory· Published Oct 5, 2025· Updated Apr 29, 2026

CVE-2025-11308

CVE-2025-11308

Description

A vulnerability was identified in Vanderlande Baggage 360 7.0.0. This issue affects some unknown processing of the file /api-addons/v1/messages. Such manipulation of the argument Message leads to cross site scripting. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored cross-site scripting vulnerability in Vanderlande Baggage 360 v7.0.0 allows authenticated attackers to inject arbitrary JavaScript via the message field.

Vulnerability

Overview CVE-2025-11308 is a stored cross-site scripting (XSS) vulnerability in Vanderlande's Baggage 360 software, version 7.0.0. The issue resides in the /api-addons/v1/messages endpoint, where the Message argument is not properly sanitized. The application accepts HTML input in the message field, stores it without escaping, and later renders it in the user interface, allowing JavaScript execution. This is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) [1][2].

Exploitation

Details An authenticated attacker with access to the "Bags" screen can exploit this by intercepting a message creation request and inserting an XSS payload (e.g., ``). The malicious message is stored and then executed when any user views the bag's journey details (Bags → [bag tag] → Interterm Bag Journey Details → Messages). Because the application supports bulk selection, a single request can attach the XSS payload to multiple bag tags simultaneously, increasing the attack's reach [1][2].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the target user's session. This could lead to session hijacking, data theft, or unauthorized actions performed on behalf of the victim. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N) reflects a high confidentiality impact, with a base score of 7.1 per the researcher's assessment, though the official NVD score is 3.5 [1].

Mitigation

Status The vendor was contacted about this disclosure but did not respond, as per the CVE entry. As of publication, there is no official patch or workaround documented. The vulnerability is publicly exploited, and may affect earlier versions as well. Organizations using Baggage 360 should monitor for vendor updates and consider application-level protections such as input validation and output encoding [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.