Cross Site Scripting Vulnerability in Otale Tale up to Version 2.0.5
CVE-2025-1585

4.8MEDIUM

Key Information:

Vendor
Otale
Status
Tale
Vendor
CVE Published:
23 February 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability has been identified in Otale Tale versions up to 2.0.5, specifically affecting the OptionsService in the header.html file. This security flaw allows an attacker to manipulate the logo_url argument, leading to potential cross site scripting attacks. Remote exploitation of this vulnerability is possible, especially in products that are no longer maintained, making them particularly vulnerable to such exploits. The details of this issue have been publicly disclosed, emphasizing the need for users to secure their installations promptly.

Affected Version(s)

tale 2.0.0

tale 2.0.1

tale 2.0.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dragonkeep (VulDB User)
.