VYPR
High severity7.1NVD Advisory· Published Jul 18, 2025· Updated Apr 15, 2026

CVE-2025-52169

CVE-2025-52169

Description

agorum Software GmbH Agorum core open v11.9.2 & v11.10.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in agorum core open v11.9.2 and v11.10.1 allows remote attackers to execute arbitrary JavaScript via crafted parameters.

Vulnerability

Overview

A reflected cross-site scripting (XSS) vulnerability exists in agorum core open, an enterprise content management (ECM) system from agorum Software GmbH. The issue, cataloged as CWE-79, stems from improper neutralization of user-supplied input during web page generation. Numerous endpoints across the application fail to sanitize or encode parameters before reflection in HTTP responses, indicating a systemic flaw in input handling [1].

Exploitation

Method

An attacker can exploit this vulnerability by crafting a malicious URL containing JavaScript payloads in parameters such as userName. For example, the request GET /roiwebui/roiwebui_module/BeginSSOLogin.jsp?userName=%22);}alert(document.domain);%3C/script%3E causes the server to reflect the injected script back to the victim’s browser, executing it in the security context of the targeted site [1]. The attack requires no authentication and can be delivered via social engineering (e.g., phishing links). A non-exhaustive list of affected endpoints includes OpenDocumentMessage.jsp, SSO.jsp, and SSOConvertToPdf.jsp, among many others [1].

Impact

Successful exploitation enables an attacker to execute arbitrary JavaScript in the victim's browser within the session context of the agorum core application. This could lead to session hijacking, credential theft, sensitive data exposure, or defacement of content. The CVSS v3.1 base score is 7.1 (High), reflecting the ease of exploitation and potential for significant harm [1].

Mitigation

Status

The vendor, agorum Software GmbH, acknowledged the vulnerability and has released fixes. The affected versions are v11.9.2 and v11.10.1; users should update to the latest patched version to remediate the issue. The advisory notes that the vulnerability was addressed prior to public disclosure [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.