VYPR
Medium severityNVD Advisory· Published May 23, 2025· Updated Apr 15, 2026

CVE-2025-3894

CVE-2025-3894

Description

Text editor embedded into MegaBIP software does not neutralize user input allowing Stored XSS attacks on other users. In order to use the editor high privileges are required. Version 5.20 of MegaBIP fixes this issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MegaBIP 5.19 and earlier contain a stored XSS vulnerability in the embedded text editor, allowing high-privileged attackers to compromise other users.

CVE-2025-3894 describes a stored cross-site scripting (XSS) vulnerability in the text editor embedded in the MegaBIP software. The editor fails to properly neutralize user-supplied input during web page generation (CWE-79). This bug affects all versions of MegaBIP through version 5.19 [1].

Exploitation requires high privileges, meaning an attacker must already have a privileged account (e.g., an editor or administrator role) within the application. The attacker can then inject malicious scripts via the text editor, which are stored and later served to other users when they view the edited content. No additional authentication bypass or network access beyond the standard application interface is needed once the attacker has the required privileges [1].

The impact is that an attacker can execute arbitrary JavaScript in the browsers of other users, potentially leading to session hijacking, data theft, or further compromise within the application's context. Stored XSS is particularly dangerous because the malicious payload persists and can affect multiple victims over time without requiring further interaction from the attacker [1].

MegaBIP version 5.20 has been released to fix this issue [1]. Additionally, the Polish government's cybersecurity authority has issued a recommendation urging entities of the national cybersecurity system to stop using MegaBIP entirely due to multiple critical vulnerabilities, including this one [2]. Administrators are advised to upgrade to the latest version or migrate to an alternative BIP platform as recommended by the authorities [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.