VYPR
Medium severity4.9NVD Advisory· Published Jul 20, 2025· Updated Apr 15, 2026

CVE-2025-54316

CVE-2025-54316

Description

An issue was discovered in Logpoint before 7.6.0. When creating reports, attackers can create custom Jinja templates that chained built-in filter functions to generate XSS payloads. These payloads can be rendered by the Logpoint Report Template engine, making it vulnerable to cross-site scripting (XSS) attacks.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Logpoint before 7.6.0 allows XSS via crafted Jinja report templates that chain built-in filter functions to inject malicious scripts.

Vulnerability

Overview

An XSS vulnerability exists in Logpoint versions prior to 7.6.0. The issue stems from the Report Template engine, which processes user-created Jinja templates. Attackers can craft templates by chaining built-in Jinja filter functions to generate and inject malicious scripts (e.g., JavaScript) into report output [1]. This occurs because user-supplied template content is not adequately sanitized before rendering.

Exploitation

To exploit this, an attacker must have the ability to create or modify report templates in Logpoint. This typically requires authenticated access with report creation privileges. The crafted template is then executed by the Report Template engine, causing the XSS payload to be rendered when the report is accessed by other users, including potentially administrators [1]. The attack vector is network-based, with high attack complexity and low privileges required, per the CVSS vector [1].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session when they view the compromised report. This can lead to session hijacking, credential theft, or defacement. The impact is amplified if an administrator views the report, potentially exposing higher-privileged sessions [1].

Mitigation

Logpoint has addressed this vulnerability in version 7.6.0. Users running any earlier version (7.5.0 and below) should upgrade to 7.6.0 or later to remediate the issue [1]. No workarounds have been published.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.