fkie_cve-2025-31326
Vulnerability from fkie_nvd
Published
2025-07-08 01:15
Modified
2025-07-08 16:18
Severity ?
Summary
SAP�BusinessObjects Business�Intelligence Platform (Web Intelligence) is vulnerable to HTML Injection, allowing an attacker with basic user privileges to inject malicious code into specific input fields. This could lead to unintended redirects or manipulation of application behavior, such as redirecting users to attacker-controlled domains. This issue primarily affects the integrity of the system. However, the confidentiality and availability of the system remain unaffected.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP\ufffdBusinessObjects Business\ufffdIntelligence Platform (Web Intelligence) is vulnerable to HTML Injection, allowing an attacker with basic user privileges to inject malicious code into specific input fields. This could lead to unintended redirects or manipulation of application behavior, such as redirecting users to attacker-controlled domains. This issue primarily affects the integrity of the system. However, the confidentiality and availability of the system remain unaffected." }, { "lang": "es", "value": "SAP BusinessObjects Business Intelligence Platform (Web Intelligence) es vulnerable a la inyecci\u00f3n de HTML, lo que permite a un atacante con privilegios de usuario b\u00e1sicos inyectar c\u00f3digo malicioso en campos de entrada espec\u00edficos. Esto podr\u00eda provocar redirecciones no deseadas o la manipulaci\u00f3n del comportamiento de la aplicaci\u00f3n, como redirigir a los usuarios a dominios controlados por el atacante. Este problema afecta principalmente a la integridad del sistema. Sin embargo, la confidencialidad y la disponibilidad del sistema permanecen intactas." } ], "id": "CVE-2025-31326", "lastModified": "2025-07-08T16:18:14.207", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 1.4, "source": "cna@sap.com", "type": "Primary" } ] }, "published": "2025-07-08T01:15:21.810", "references": [ { "source": "cna@sap.com", "url": "https://me.sap.com/notes/3573199" }, { "source": "cna@sap.com", "url": "https://url.sap/sapsecuritypatchday" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-80" } ], "source": "cna@sap.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…