VYPR
Medium severity6.1OSV Advisory· Published Oct 30, 2025· Updated Apr 15, 2026

CVE-2025-56313

CVE-2025-56313

Description

A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the /publix/run endpoint of JATOS 3.7.1 through 3.9.6 (inclusive). This allows remote attackers to execute arbitrary JavaScript in a user's web browser by including a malicious payload in the "code" URL parameter. When an authenticated admin user accesses the study's URL, the malicious script gets interpreted and executes within their browser, which can lead to unauthorized actions, account compromise, and privilege escalation.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in JATOS 3.7.1–3.9.6 allows remote attackers to execute arbitrary JavaScript via the 'code' parameter, affecting authenticated admins.

Vulnerability

Analysis

A reflected cross-site scripting (XSS) vulnerability has been identified in the /publix/run endpoint of JATOS versions 3.7.1 through 3.9.6. The flaw stems from insufficient sanitization of the code URL parameter, allowing an attacker to inject arbitrary JavaScript. When the crafted URL is processed, the malicious script is reflected back into the browser response without proper encoding, leading to code execution within the context of the victim's session.

Exploitation

Prerequisites

Exploitation requires an authenticated admin user to visit a crafted URL containing the malicious payload in the code parameter. The attacker does not need prior authentication; any remote attacker can deliver the URL via social engineering (e.g., email or a malicious link). The vulnerability is triggered when the admin accesses the study's URL, causing the payload to execute in their browser session.

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the admin user's session. This can lead to unauthorized actions such as modifying study data, creating new admin accounts, exfiltrating sensitive information, and potentially full privilege escalation within the JATOS instance. The risk is amplified because the admin account typically has elevated permissions.

Mitigation

As of the publication date, the vulnerability affects JATOS versions 3.7.1 through 3.9.6 inclusive. Users should update to a patched version if one becomes available (the advisory is silent on a specific fix version). General security best practices include enforcing input validation for all URL parameters and sanitizing output to prevent XSS. No workaround has been explicitly mentioned, but restricting access to admin URLs and using web application firewall (WAF) rules that inspect the code parameter may reduce risk. The vendor has been notified [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • JATOS/JatosOSV2 versions
    v3.7.1, v3.7.2, v3.7.3, …+ 1 more
    • (no CPE)range: v3.7.1, v3.7.2, v3.7.3, …
    • (no CPE)range: >=3.7.1 <=3.9.6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.