{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15479","assignerOrgId":"64c5ae8f-7972-4697-86a0-7ada793ac795","state":"PUBLISHED","assignerShortName":"TCS-CERT","dateReserved":"2026-01-07T13:10:13.147Z","datePublished":"2026-01-07T13:23:09.002Z","dateUpdated":"2026-01-07T15:03:22.729Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["user profile management functionality"],"platforms":["Windows","Linux"],"product":"NGSurvey","vendor":"Data Illusion  Zumbrunn","versions":[{"changes":[{"at":"3.6.17","status":"unaffected"}],"lessThan":"3.6.17","status":"affected","version":"3.6.4","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:data_illusion_zumbrunn:ngsurvey:*:*:windows:*:*:*:*:*","versionEndExcluding":"3.6.17","versionStartIncluding":"3.6.4","vulnerable":true},{"criteria":"cpe:2.3:a:data_illusion_zumbrunn:ngsurvey:*:*:linux:*:*:*:*:*","versionEndExcluding":"3.6.17","versionStartIncluding":"3.6.4","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","type":"finder","value":"Thomas Clair"}],"datePublic":"2025-05-28T08:23:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Stored cross-site scripting (XSS, CWE-79) in the survey content and administration functionality in Data Illusion Zumbrunn NGSurvey Enterprise Edition 3.6.4 on all supported platforms (\n\non Windows and Linux servers ) allows authenticated remote users with survey creation or edit privileges to execute arbitrary JavaScript in other users’ browsers, steal session information and perform unauthorized actions on their behalf via crafted survey content that is rendered without proper output encoding."}],"value":"Stored cross-site scripting (XSS, CWE-79) in the survey content and administration functionality in Data Illusion Zumbrunn NGSurvey Enterprise Edition 3.6.4 on all supported platforms (\n\non Windows and Linux servers ) allows authenticated remote users with survey creation or edit privileges to execute arbitrary JavaScript in other users’ browsers, steal session information and perform unauthorized actions on their behalf via crafted survey content that is rendered without proper output encoding."}],"impacts":[{"capecId":"CAPEC-63","descriptions":[{"lang":"en","value":"CAPEC-63 Cross-Site Scripting (XSS)"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":5.1,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"NGSurvey Enterprise 3.6.4 stored XSS via survey content enables arbitrary JavaScript execution","lang":"en"}]}],"providerMetadata":{"orgId":"64c5ae8f-7972-4697-86a0-7ada793ac795","shortName":"TCS-CERT","dateUpdated":"2026-01-07T13:23:09.002Z"},"references":[{"tags":["vendor-advisory"],"url":"https://docs.ngsurvey.com/installation-setup/change-log#id-3.6.17-2025-05-28"},{"tags":["third-party-advisory"],"url":"https://cds.thalesgroup.com/en/tcs-cert/CVE-2025-15479"}],"source":{"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2025-05-12T23:41:00.000Z","value":"Vulnerability discovered by the pentester"},{"lang":"en","time":"2025-05-22T07:42:00.000Z","value":"Report submitted to TCS-CERT"},{"lang":"en","time":"2025-05-27T07:45:00.000Z","value":"Vulnerability Report to Vendor through email (support@dataillusion.com)"},{"lang":"en","time":"2025-05-17T07:46:00.000Z","value":"Vendor acknowledged the report and confirmed fixes in v3.6.17"},{"lang":"en","time":"2026-01-07T13:12:00.000Z","value":"CVE ID assigned"},{"lang":"en","time":"2026-01-07T15:12:00.000Z","value":"Vulnerability Disclosure"}],"title":"NGSurvey Enterprise 3.6.4 incorrect authorization exposes other users’ API keys and personal data","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-07T14:10:29.702195Z","id":"CVE-2025-15479","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-07T15:03:22.729Z"}}]}}