VYPR
Low severity3.5GHSA Advisory· Published Aug 17, 2025· Updated Apr 29, 2026

CVE-2025-9095

CVE-2025-9095

Description

A flaw has been found in ExpressGateway express-gateway up to 1.16.10. This issue affects some unknown processing in the library lib/rest/routes/users.js of the component REST Endpoint. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS vulnerability in ExpressGateway's REST API allows injection of malicious scripts via user/app fields due to missing sanitization.

Vulnerability

Overview A stored cross-site scripting (XSS) vulnerability exists in ExpressGateway's REST API endpoints for user and application management (lib/rest/routes/users.js and lib/rest/routes/apps.js) up to version 1.16.10 [1]. The root cause is the lack of input validation and output sanitization: user-controlled fields such as firstname and name are directly passed to service layer functions (e.g., usersSrv.insert()) without any filtering, allowing attackers to inject arbitrary HTML and JavaScript [1].

Exploitation

An attacker can remotely exploit this flaw by sending specially crafted POST or PUT requests to the /users or /apps endpoints with malicious payloads in controllable fields [1]. The injected script is stored in the backend and executed when an administrator or other user views the affected data in their browser. No authentication is required to perform the attack if the endpoints are exposed, as the default configuration may allow unauthenticated access [1].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser, leading to session hijacking, theft of sensitive information (e.g., API keys, credentials), and unauthorized actions on behalf of the victim. If a privileged user such as an administrator is targeted, the attacker could potentially elevate access, manipulate application data, or compromise the entire gateway [1].

Mitigation

The vendor was contacted but did not respond, and the project is now deprecated with no official fix available [4]. Users should consider disabling or restricting access to the vulnerable REST API endpoints, implementing strong input validation and output encoding at a reverse proxy or web application firewall (WAF), or migrating to an actively maintained alternative.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
express-gatewaynpm
<= 1.16.10

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.