Cyber Posture

CVE-2025-59467

High

Published: 05 January 2026

Published
05 January 2026
Modified
05 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0008 24.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-59467 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Ui Argentina Afip Invoices. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 24.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-79

Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.

addresses: CWE-79

Validates web inputs to reject script-related content that could produce XSS.

addresses: CWE-79

Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

XSS flaw directly enables remote exploitation of the public-facing UCRM plugin (T1190) via a malicious page visited by an admin (T1189), resulting in privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A Cross-Site Scripting (XSS) vulnerability in the UCRM Argentina AFIP invoices Plugin (v1.2.0 and earlier) could allow privilege escalation if an Administrator is tricked into visiting a crafted malicious page. This plugin is disabled by default. Affected Products: UCRM Argentina…

more

AFIP invoices Plugin (Version 1.2.0 and earlier) Mitigation: Update UCRM Argentina AFIP invoices Plugin to Version 1.3.0 or later.

Deeper analysisAI

CVE-2025-59467 is a Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, in the UCRM Argentina AFIP invoices Plugin versions 1.2.0 and earlier. This plugin, which integrates with Ubiquiti's UCRM for handling Argentina AFIP invoices and is disabled by default, contains a flaw that could allow privilege escalation if an administrator is tricked into visiting a crafted malicious page.

The attack requires network access (AV:N), high complexity (AC:H), no attacker privileges (PR:N), and user interaction (UI:R) from the administrator, yielding a CVSS v3.1 base score of 7.5 (High) with unchanged scope (S:U) and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). An unauthenticated attacker could exploit this by luring an admin to the malicious page, potentially escalating privileges within the affected UCRM environment.

Ubiquiti's Security Advisory Bulletin 057 recommends updating the UCRM Argentina AFIP invoices Plugin to version 1.3.0 or later as the primary mitigation. Further details are available at https://community.ui.com/releases/Security-Advisory-Bulletin-057/6d3f2a51-22b8-47a1-9296-1e9dcd64e073.

Details

CWE(s)

Affected Products

ui
argentina afip invoices
≤ 1.3.0

CVEs Like This One

CVE-2025-52665Same vendor: Ui
CVE-2026-26276Shared CWE-79
CVE-2025-13002Shared CWE-79
CVE-2025-68838Shared CWE-79
CVE-2024-56028Shared CWE-79
CVE-2026-1216Shared CWE-79
CVE-2025-28917Shared CWE-79
CVE-2025-67984Shared CWE-79
CVE-2025-69318Shared CWE-79
CVE-2026-1931Shared CWE-79

References