CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
Lifecycle Timeline
3DescriptionNVD
A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.0.0.4, 10.1.0.0 through 10.1.0.5, and 10.2.0.0 through 10.2.0.4 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient input validation. A successful exploit requires user interaction and could allow an attacker to execute arbitrary scripts with a limited impact on the confidentiality and the integrity.
AnalysisAI
CVE-2025-27828 is a reflected cross-site scripting (XSS) vulnerability in the legacy chat component of Mitel MiContact Center Business that allows unauthenticated attackers to execute arbitrary scripts in victim browsers through maliciously crafted URLs. The vulnerability affects multiple versions (10.0.0.4 and earlier, 10.1.0.0-10.1.0.5, and 10.2.0.0-10.2.0.4) and requires user interaction to exploit. While the CVSS score of 7.1 is moderate-to-high, the impact is limited to confidentiality and integrity with no availability impact, and exploitation requires social engineering to trick users into clicking malicious links.
Technical ContextAI
This vulnerability stems from insufficient input validation in the legacy chat component (CWE-79: Improper Neutralization of Input During Web Page Generation), a classic reflected XSS flaw where user-supplied input is reflected back in HTTP responses without proper encoding or sanitization. The affected product is Mitel MiContact Center Business (CPE context suggests enterprise communications software), where the chat feature fails to validate or encode user-controlled parameters before rendering them in HTML context. The legacy nature of the component indicates this may be older code with outdated security practices, potentially using unsafe string concatenation or DOM manipulation instead of secure templating frameworks.
RemediationAI
Patching: Upgrade MiContact Center Business to patched versions (exact patched versions not provided in input data; contact Mitel support or check Mitel security advisories for 10.0.0.5+, 10.1.0.6+, or 10.2.0.5+); priority: High Immediate Mitigation: If patching is delayed, disable or restrict access to the legacy chat component to authenticated users only; implement network-level restrictions (WAF rules) to filter reflected XSS payloads in chat parameters (e.g., filter script tags, event handlers, javascript: URIs); priority: High Detection: Monitor HTTP logs for suspicious chat component URLs containing script tags, HTML entities, or encoded payloads; alert on requests with high entropy in chat parameters; priority: Medium User Education: Train users not to click external links to MiContact Center chat interfaces; verify chat URLs come from trusted internal sources before clicking; priority: Medium Code Remediation (Vendor/Development): Implement proper input validation and output encoding: use parameterized/context-aware templating engines, encode all user input with HTML entity encoding, implement Content Security Policy (CSP) headers to restrict script execution; priority: High
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-19033