CVE-2025-59467
Published: 05 January 2026
Summary
CVE-2025-59467 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Ui Argentina Afip Invoices. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 24.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.
Validates web inputs to reject script-related content that could produce XSS.
Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS flaw directly enables remote exploitation of the public-facing UCRM plugin (T1190) via a malicious page visited by an admin (T1189), resulting in privilege escalation (T1068).
NVD Description
A Cross-Site Scripting (XSS) vulnerability in the UCRM Argentina AFIP invoices Plugin (v1.2.0 and earlier) could allow privilege escalation if an Administrator is tricked into visiting a crafted malicious page. This plugin is disabled by default. Affected Products: UCRM Argentina…
more
AFIP invoices Plugin (Version 1.2.0 and earlier) Mitigation: Update UCRM Argentina AFIP invoices Plugin to Version 1.3.0 or later.
Deeper analysisAI
CVE-2025-59467 is a Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, in the UCRM Argentina AFIP invoices Plugin versions 1.2.0 and earlier. This plugin, which integrates with Ubiquiti's UCRM for handling Argentina AFIP invoices and is disabled by default, contains a flaw that could allow privilege escalation if an administrator is tricked into visiting a crafted malicious page.
The attack requires network access (AV:N), high complexity (AC:H), no attacker privileges (PR:N), and user interaction (UI:R) from the administrator, yielding a CVSS v3.1 base score of 7.5 (High) with unchanged scope (S:U) and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). An unauthenticated attacker could exploit this by luring an admin to the malicious page, potentially escalating privileges within the affected UCRM environment.
Ubiquiti's Security Advisory Bulletin 057 recommends updating the UCRM Argentina AFIP invoices Plugin to version 1.3.0 or later as the primary mitigation. Further details are available at https://community.ui.com/releases/Security-Advisory-Bulletin-057/6d3f2a51-22b8-47a1-9296-1e9dcd64e073.
Details
- CWE(s)