SAGE DPW Schwachstelle – XSS in DB-Monitor “tabfields”

grafik mit dem Text: CVE-2025-51531

CVE-2025-51531 – SAGE DPW Schwachstelle – XSS in DB-Monitor “tabfields”

Metadaten

CVE-ID CVE-2025-51531
Product Sage DPW v8
Vendor Sage GmbH
Affected Version ≤ 2024_12_004
Fixed Version 2025_06_000 – Released June 2025
CVSS v3.1 6.1 Medium
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE CWE-79
Reference
NVD CVE-2025-51531
EUVD EUVD-2025-23861
Discovery Date 16.April.2025
Credits Ferat Aydin

Vulnerability

The page a-9065.htm echoes the value of the tabfields parameter directly into the HTML output without any server-side encoding or sanitisation.
By injecting a closing quote followed by arbitrary JavaScript, an attacker can execute code in the victim’s browser every time the crafted link is opened.

/dpw/scripts/cgiip.exe/WService=v8pweb/a-9065.htm?aktion=anzeigen&dpwr=&tabfields=

Because the vulnerable page resides in an administrative module, links to it are typically visited by privileged users.

Risk

  • Session hijacking & impersonation the attacker could steal session cookies and act with the victim’s privileges.
  • Privilege abuse administrators who open a malicious link could grant more access
  • Client-side redirects & phishing, injected JavaScript can silently forward the admin to a cloned login page or exfiltrate credentials.

Vendor Statement

“Will be fixed by removing this component.”

Recommendation

  • Update to Version 2025_06_000

Proof of Concept / Beweisführung

GET /dpw/scripts/cgiip.exe/WService=v8pweb/a-9065.htm?aktion=anzeigen&dpwr=&tabfields=sec4you"><script>alert(1)</script>sec4you

Timeline

2025 Event Details
16 Apr Vulnerabilities Discovered Identified during an external penetration test.
17 Apr Initial Contact Researcher contacted kundenservice@sagedpw.at seeking disclosure procedure.
22 Apr Forward Request Sage DPW Austria asked researcher to forward the PDF report internally.
23 Apr Responsible Contacts Identified Sage confirmed SOC@sage.com and CDO as primary contacts.
24 Apr Agreement on Communication Channel Communication via CDO agreed; unencrypted report delivery approved by Sage. Coordinated Disclosure Report translated into English.
02 May Full Disclosure Report Delivered Report submitted in English to CDO@sage.com.
07 May Meeting with Sage Joint discussion of vulnerabilities, CVSS ratings, and agreement on retesting within vendor-provided environment.
07 May Sage Proposes Lower CVSS Ratings Sage emailed researcher suggesting lower severity ratings for reported vulnerabilities.
08 May Independent CVSS Review by CERT.at Researcher requested independent CVSS assessment from CERT.at.
14 May CERT.at Confirms CVSS Scores CERT.at validated researcher’s original CVSS scores (minor CWE adjustment on one issue).
14 May Researcher Informs Sage of CERT.at Result Informed Sage of independent validation and requested confirmation of affected Sage DPW versions.
19 May Sage Confirms Affected Versions & Fix Plan Sage confirmed affected versions ≤ 2024_12_004, announcing fix for the Semi-Annual Release (2025_06_000), planned for June 2025. Conditioned patch access on customer identity disclosure.
21 May Severity Discussion Continues Researcher reaffirms original CVSS ratings, rejecting Sage’s proposed downgrades.
22 May Sage Insists on Severity Downgrade Sage maintains its position, continuing to dispute CVSS severity ratings.
10 June Sage Requests CVE IDs & Drafts Sage asked researcher about CVE IDs and requested preliminary CVE drafts.
10 June Researcher Requests Fix Status & CVE Delay Researcher informed Sage of MITRE delays and asked if fixes were already deployed.
10 June Sage Repeats Retest Conditions Sage again conditioned retest access on revealing customer identity.
15 June Sage Deploys Fixes
(Undisclosed to Researcher)
Sage Deploy Fixes 2025_06_000
17 July Researcher Provides CVE IDs, Requests Clarification Researcher informed Sage about reserved CVE IDs (CVE-2025-51531, CVE-2025-51532, CVE-2025-51533) and requested clear information on actual fix version and release date.
Researcher announced plan for public disclosure shortly after 31 July 2025.
21 July Sage Reveals Fix Already Released on 15 June Sage officially stated fixes were released on 15 June 2025 in version 2024_12_004, contradicting their earlier announcement (2025_06_000). Sage again disputed CVSS ratings and requested pre-publication CVE text approval.
28 July Final Notification by Researcher Researcher explicitly informed Sage about imminent public disclosure (starting 01 Aug 2025), highlighting Sage’s lack of transparency regarding the 15 June release, inappropriate conditional patch access, and inconsistent communication regarding versions.

Researcher set a final clarification deadline for Sage (31 July 2025, 17:00 GMT+1), stating that CVSS scores will not change unless formally disputed via MITRE.

28 July Sage Admits Unauthorized Retest by Another Party Sage admitted conducting retesting of fixes with a third-party provider, despite explicitly agreeing earlier that retests would be performed jointly with the original researcher.
28 July Deadline for Final Clarification Sage acknowledged internal confusion and inconsistencies regarding fix versions, but provided no adequate correction to earlier conditional access demands, transparency issues related to the undisclosed release, nor the third-party retesting.
05 Aug CVE Public Disclosure CVEs publicly disclosed by Researcher, explicitly noting issues identified during the disclosure process.

Notes

We appreciate Sage’s initial willingness to engage in the coordinated vulnerability disclosure process and acknowledge the early technical dialogue.

However, we must also note that several aspects of the process diverged from internationally recognized standards, particularly ISO/IEC 29147:2018 and established coordinated disclosure practices. These included:

  • Requiring disclosure of the affected customer’s identity as a condition for retest or patch access (in violation of confidentiality principles).
  • Failing to proactively inform the reporter about the release of the fix.
  • Not documenting the security fix transparently in release notes.
  • Conducting a unilateral retest with a third-party provider despite prior agreement for joint testing.
  • Providing inconsistent and contradictory information regarding affected and fixed versions.

These issues led to unnecessary delays, limited transparency, and prevented full validation of the remediation prior to public disclosure.

We remain committed to working constructively with vendors and hope that future disclosure processes will more closely align with ISO/IEC 29147:2018 and industry best practices.

The information presented in this article is based on factual communication and our direct experience during the disclosure process.

Zurück zur Übersicht