CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Lifecycle Timeline
3Tags
Description
A Cross-Site Scripting (XSS) vulnerability exists in Znuny::ITSM 6.5.x in the customer.pl endpoint via the OTRSCustomerInterface parameter
Analysis
A Cross-Site Scripting (XSS) vulnerability exists in Znuny::ITSM 6.5.x where the customer.pl endpoint improperly handles the OTRSCustomerInterface parameter, allowing attackers to inject and execute arbitrary JavaScript in the context of victim browsers. This affects Znuny ITSM versions in the 6.5.x release line, and a proof-of-concept exploit has been publicly disclosed on GitHub, indicating active awareness and potential exploitation capability in the threat landscape.
Technical Context
The vulnerability is rooted in improper input validation and output encoding in a web application parameter handler. Specifically, the OTRSCustomerInterface parameter passed to the customer.pl endpoint in Znuny::ITSM fails to sanitize or properly encode user-supplied input before reflecting it back in HTTP responses. This is a classic reflected XSS vulnerability (CWE category: Improper Neutralization of Input During Web Page Generation). Znuny is an open-source IT Service Management (ITSM) and help desk ticketing system built on the OTRS framework. The affected component (customer.pl) is the customer-facing interface endpoint responsible for handling customer interactions, making it a high-value attack surface for phishing, credential harvesting, and malware distribution campaigns.
Affected Products
Znuny::ITSM version 6.5.x is affected by this vulnerability. The CPE for this product is listed as cpe:2.3:a:n/a:n/a:*:*:*:*:*:*:*:* in the CVE record, though this appears to be a placeholder entry; the actual affected software is Znuny ITSM. Affected organizations should consult the official Znuny security advisories at http://znuny.com for confirmation of the exact minor versions impacted within the 6.5.x branch and for guidance on patched versions. Reference material is also available at http://znunyitsm.com.
Remediation
Immediately upgrade Znuny::ITSM to a patched version released after this vulnerability disclosure; check http://znuny.com and http://znunyitsm.com for official security advisories and version numbers. As a temporary mitigation pending patching, implement input validation and output encoding on the OTRSCustomerInterface parameter by deploying a Web Application Firewall (WAF) rule that blocks requests containing script-like payloads (e.g., javascript:, <script>, onerror=), enforce Content-Security-Policy (CSP) headers to restrict script execution origins, and restrict access to the customer.pl endpoint to known trusted IP ranges if operationally feasible. Additionally, apply HTTPS with HSTS to prevent man-in-the-middle payload injection, and monitor access logs for suspicious parameter values.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-208946
GHSA-79wq-mgjf-5cc2