CVE-2025-9095
Description
A flaw has been found in ExpressGateway express-gateway up to 1.16.10. This issue affects some unknown processing in the library lib/rest/routes/users.js of the component REST Endpoint. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS vulnerability in ExpressGateway's REST API allows injection of malicious scripts via user/app fields due to missing sanitization.
Vulnerability
Overview A stored cross-site scripting (XSS) vulnerability exists in ExpressGateway's REST API endpoints for user and application management (lib/rest/routes/users.js and lib/rest/routes/apps.js) up to version 1.16.10 [1]. The root cause is the lack of input validation and output sanitization: user-controlled fields such as firstname and name are directly passed to service layer functions (e.g., usersSrv.insert()) without any filtering, allowing attackers to inject arbitrary HTML and JavaScript [1].
Exploitation
An attacker can remotely exploit this flaw by sending specially crafted POST or PUT requests to the /users or /apps endpoints with malicious payloads in controllable fields [1]. The injected script is stored in the backend and executed when an administrator or other user views the affected data in their browser. No authentication is required to perform the attack if the endpoints are exposed, as the default configuration may allow unauthenticated access [1].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser, leading to session hijacking, theft of sensitive information (e.g., API keys, credentials), and unauthorized actions on behalf of the victim. If a privileged user such as an administrator is targeted, the attacker could potentially elevate access, manipulate application data, or compromise the entire gateway [1].
Mitigation
The vendor was contacted but did not respond, and the project is now deprecated with no official fix available [4]. Users should consider disabling or restricting access to the vulnerable REST API endpoints, implementing strong input validation and output encoding at a reverse proxy or web application firewall (WAF), or migrating to an actively maintained alternative.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
express-gatewaynpm | <= 1.16.10 | — |
Affected products
2<= 1.16.10+ 1 more
- (no CPE)range: <= 1.16.10
- (no CPE)range: <=1.16.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-q4rg-7cjj-5r86ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-9095ghsaADVISORY
- github.com/freshfish-hust/my-cves/issues/5nvdWEB
- github.com/freshfish-hust/my-cves/issues/5nvdWEB
- vuldb.comnvdWEB
- vuldb.comnvdWEB
- vuldb.comnvdWEB
News mentions
0No linked articles in our index yet.