The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next').
Metrics
Affected Vendors & Products
References
History
Sun, 14 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisa
Cisa software Acquisition Guide Tool |
|
| Vendors & Products |
Cisa
Cisa software Acquisition Guide Tool |
Fri, 12 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next'). | |
| Title | Software Acquisition Guide Supplier Response Web Tool XSS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published: 2025-12-12T20:36:25.597Z
Updated: 2025-12-12T20:36:25.597Z
Reserved: 2025-12-09T17:06:11.269Z
Link: CVE-2025-67634
No data.
Status : Awaiting Analysis
Published: 2025-12-12T21:15:59.480
Modified: 2025-12-15T18:22:40.637
Link: CVE-2025-67634
No data.