VYPR
Medium severity4.3NVD Advisory· Published May 10, 2025· Updated Apr 15, 2026

CVE-2025-4512

CVE-2025-4512

Description

A vulnerability classified as problematic has been found in Inetum IODAS 7.2-LTS.4.1-JDK7/7.2-RC3.2-JDK7. Affected is an unknown function of the file /astre/iodasweb/app.jsp. The manipulation of the argument action leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Inetum IODAS 7.2-LTS.4.1-JDK7 and 7.2-RC3.2-JDK7 contain a reflected XSS vulnerability via the 'action' parameter in /astre/iodasweb/app.jsp.

Vulnerability

Overview

The Inetum IODAS application versions 7.2-LTS.4.1-JDK7 and 7.2-RC3.2-JDK7 contain a reflected cross-site scripting (XSS) vulnerability in the file /astre/iodasweb/app.jsp. An unknown function within this file fails to properly validate and encode user-supplied input when processing the action parameter. This allows an attacker to inject arbitrary JavaScript code that is immediately reflected back in the application's HTTP response [1].

Exploitation

Method

An attacker can exploit this vulnerability by crafting a malicious URL that includes a payload in the action parameter, such as ``. Since the attack is remote and does not require authentication, the attacker only needs to trick a victim into clicking the crafted link. The injected script then executes in the victim's browser within the context of the IODAS web application [1].

Impact and

Consequences

Successful exploitation enables a range of malicious activities, including performing actions on behalf of authenticated users, stealing session tokens, defacing the application's interface, redirecting victims to malicious sites, or conducting phishing attacks. These outcomes can lead to unauthorized access to user accounts and overall data compromise [1]. The vendor, Inetum, was contacted but did not respond, leaving no official patch or acknowledgement available as of publication [CVE description].

Mitigation

Status

No patch or vendor advisory has been released. Users are advised to implement mitigations such as sanitizing all user input, applying proper output encoding, deploying a Content Security Policy (CSP), and setting HttpOnly and Secure flags on cookies. Reviewing Web Application Firewall (WAF) settings is also recommended [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.