Cyber Posture

CVE-2025-51534

HighPublic PoC

Published: 04 August 2025

Published
04 August 2025
Modified
20 September 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0013 31.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-51534 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Craws Openatlas. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 31.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates and sanitizes inputs to the Name field, preventing injection of crafted XSS payloads by high-privilege attackers.

prevent

Filters and encodes information outputs when rendering the injected Name field in contexts like the delete button, blocking arbitrary script execution in victims' browsers.

preventrecover

Identifies, reports, and corrects the specific stored XSS flaw in OpenAtlas v8.11.0 through timely patching and remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1659 Content Injection Initial Access
Adversaries may gain access and continuously communicate with victims by injecting malicious content into systems through online network traffic.
Why these techniques?

Stored XSS enables exploitation for privilege escalation (T1068) via arbitrary JS execution in victim browsers, JavaScript interpreter abuse (T1059.007), web session cookie theft for account takeover (T1539), and content injection (T1659).

NVD Description

A cross-site scripting (XSS) vulnerability in Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name field.

Deeper analysisAI

CVE-2025-51534 is a cross-site scripting (XSS) vulnerability in OpenAtlas version 8.11.0, a software product from the Austrian Archaeological Institute (ÖAI). The issue, classified under CWE-79, enables attackers to inject a crafted payload into the Name field, resulting in the execution of arbitrary web scripts or HTML. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N), indicating high severity due to network accessibility, low complexity, and impacts on confidentiality and integrity with a changed scope.

The vulnerability can be exploited by attackers who possess high privileges (PR:H), such as authenticated users with elevated access in the OpenAtlas system. By injecting a malicious payload into the Name field, the attacker creates a stored XSS condition. This payload executes when another user with required privileges interacts with the affected content, such as viewing a delete button, requiring user interaction (UI:R) to trigger in the victim's browser context. Successful exploitation can compromise confidentiality and integrity at a high level, potentially allowing data theft or manipulation across scoped boundaries.

Advisories referenced in the CVE, primarily from sec4you-pentest.com, detail the stored nested XSS in the delete button context, as described at https://www.sec4you-pentest.com/schwachstelle/openatlas-stored-nested-xss-delete-button/ and related pages. These sources provide technical vulnerability information but do not specify patches or mitigations in the available CVE data.

Details

CWE(s)

Affected Products

craws
openatlas
≤ 8.12.0

CVEs Like This One

CVE-2025-60915Same product: Craws Openatlas
CVE-2025-51536Same product: Craws Openatlas
CVE-2026-40283Shared CWE-79
CVE-2026-27627Shared CWE-79
CVE-2025-24410Shared CWE-79
CVE-2024-55074Shared CWE-79
CVE-2025-22219Shared CWE-79
CVE-2026-22720Shared CWE-79
CVE-2026-21361Shared CWE-79
CVE-2026-23525Shared CWE-79

References