{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/products/online-support-application-v3-through-31122025/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":9.8,"id":"CVE-2025-14320"}],"_cs_exploited":false,"_cs_products":["Online Support Application (V3 through 31122025)"],"_cs_severities":["medium"],"_cs_tags":["xss","reflected-xss","cve-2025-14320"],"_cs_type":"advisory","_cs_vendors":["Tegsoft"],"content_html":"\u003cp\u003eA reflected cross-site scripting (XSS) vulnerability, identified as CVE-2025-14320, exists within the Tegsoft Management and Information Services Trade Limited Company Online Support Application. This vulnerability affects versions V3 through 31122025. An attacker can exploit this vulnerability by injecting malicious scripts into a web page, which is then reflected back to the user, leading to potential data theft, session hijacking, or website defacement. This vulnerability was reported by the Computer Emergency Response Team of the Republic of Turkey. Successful exploitation requires tricking a user into clicking a specially crafted link.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAttacker crafts a malicious URL containing a JavaScript payload.\u003c/li\u003e\n\u003cli\u003eThe attacker distributes the crafted URL via email, social media, or other means.\u003c/li\u003e\n\u003cli\u003eUnsuspecting user clicks the malicious URL.\u003c/li\u003e\n\u003cli\u003eThe user\u0026rsquo;s browser sends a request to the vulnerable Tegsoft Online Support Application with the malicious script as a parameter.\u003c/li\u003e\n\u003cli\u003eThe Tegsoft application fails to properly sanitize the input.\u003c/li\u003e\n\u003cli\u003eThe application reflects the malicious script back to the user\u0026rsquo;s browser within the HTML response.\u003c/li\u003e\n\u003cli\u003eThe user\u0026rsquo;s browser executes the malicious script.\u003c/li\u003e\n\u003cli\u003eThe script can then perform actions such as stealing cookies, redirecting the user to a phishing site, or defacing the web page.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this reflected XSS vulnerability can lead to the execution of arbitrary JavaScript code in the context of the victim\u0026rsquo;s browser. This can result in session hijacking, where an attacker gains unauthorized access to the user\u0026rsquo;s account. It can also lead to data theft, where sensitive information is stolen from the user\u0026rsquo;s browser. Furthermore, the attacker can redirect the user to a phishing website or deface the Online Support Application, potentially impacting multiple users.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eApply available patches or updates from Tegsoft to address CVE-2025-14320 on the Online Support Application.\u003c/li\u003e\n\u003cli\u003eImplement proper input validation and output encoding to prevent XSS vulnerabilities in the application based on CWE-79.\u003c/li\u003e\n\u003cli\u003eDeploy the provided Sigma rule to detect potential XSS attempts in web server logs.\u003c/li\u003e\n\u003cli\u003eEducate users about the dangers of clicking on suspicious links to mitigate the initial access vector.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-04T09:15:59Z","date_published":"2026-05-04T09:15:59Z","id":"/briefs/2024-01-tegsoft-xss/","summary":"CVE-2025-14320 is a reflected cross-site scripting (XSS) vulnerability in Tegsoft Online Support Application versions V3 through 31122025, allowing attackers to inject arbitrary web scripts into user browsers.","title":"Tegsoft Online Support Application Reflected XSS Vulnerability (CVE-2025-14320)","url":"https://feed.craftedsignal.io/briefs/2024-01-tegsoft-xss/"}],"language":"en","title":"CraftedSignal Threat Feed — Online Support Application (V3 Through 31122025)","version":"https://jsonfeed.org/version/1.1"}