CVE-2025-67634

4.4 MEDIUM
Published: December 12, 2025 Modified: January 02, 2026
View on NVD

Description

The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next').

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://www.cisa.gov/software-acquisition-guide/tool
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Product
https://www.cve.org/CVERecord?id=CVE-2025-67634
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Vendor Advisory

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
4.4 / 10.0
EPSS (Exploit Probability)
0.0%
10th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

cisa