VYPR
Medium severity6.1NVD Advisory· Published Oct 21, 2025· Updated Apr 15, 2026

CVE-2025-60932

CVE-2025-60932

Description

Multiple stored cross-site scripting (XSS) vulnerabilities in the Current Goals function of HR Performance Solutions Performance Pro v3.19.17 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Goal Name, Goal Notes, Action Step Name, Action Step Description, Note Name, and Goal Description parameters. The patched version is PP-Release-6.3.2.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Multiple stored XSS vulnerabilities in HR Performance Solutions Performance Pro v3.19.17 and earlier allow authenticated attackers to inject arbitrary scripts via goal and action step parameters; patched in PP-Release-6.3.2.0.

Vulnerability

Overview

The Current Goals module of HR Performance Solutions Performance Pro v3.19.17 and earlier contains multiple stored cross-site scripting (XSS) vulnerabilities. The application fails to properly sanitize or encode user-supplied input in several fields, including Goal Name, Goal Notes, Action Step Name, Action Step Description, Note Name, and Goal Description. Malicious payloads injected by an authenticated user are stored server-side and later rendered in the browser of any user viewing the affected pages, leading to arbitrary script execution [1].

Exploitation

Method

An authenticated attacker can inject malicious JavaScript into the vulnerable input fields via POST requests to the goal setup endpoint (index.php?mode=mGoalSetup&job=update&id=<goal_id>). The payload is then reflected when other users view or print goals, such as through viewgoals.php?printview=1&type=current. The attacker may lure victims by sending a crafted URL via phishing or social engineering, and when the victim navigates to that URL, the stored payload executes in the victim's browser context [1].

Impact

Successful exploitation allows an attacker to execute arbitrary scripts in the victim's browser, alter the application's user interface, and potentially redirect victims to malicious sites. Because the stored input persists on the server, every subsequent viewer of the affected goals is exposed to the attack, increasing the blast radius beyond a single session [1].

Mitigation

The vendor has released a patched version, PP-Release-6.3.2.0, which addresses these vulnerabilities. Users are strongly advised to update to this version or later to eliminate the risk of stored XSS. No other workarounds are documented in the available reference [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.