PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-35996 KUNBUS GmbH CVE debrief

CVE-2025-35996 is a critical cross-site scripting issue in KUNBUS PiCtory 2.11.1 and earlier. An authenticated remote attacker can supply a specially crafted filename through API endpoints; when that filename is later shown in the list of configuration files, missing escaping or sanitization can cause the browser to execute it as HTML/script content.

Vendor
KUNBUS GmbH
Product
Revolution Pi OS Bookworm
CVSS
CRITICAL 9
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-01
Original CVE updated
2025-07-10
Advisory published
2025-05-01
Advisory updated
2025-07-10

Who should care

Organizations running KUNBUS Revolution Pi / PiCtory, especially operators exposing management or configuration interfaces to authenticated users. This is most relevant where browser-based administration is used and where user-controlled filenames can be stored and later displayed.

Technical summary

The CISA CSAF advisory for ICSA-25-121-01 states that KUNBUS PiCtory version 2.11.1 and earlier are vulnerable to a stored cross-site scripting condition. The issue requires an authenticated remote attacker, low privileges, and user interaction, consistent with the CVSS 3.1 vector CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H. The flaw arises because a crafted filename stored via API endpoints is later transmitted to the client without adequate escaping or sanitization, allowing script execution in the browser context.

Defensive priority

Immediate

Recommended defensive actions

  • Upgrade PiCtory to version 2.12 as recommended by KUNBUS.
  • Use the Cockpit management UI for the preferred update path where available.
  • Enable authentication if it is not already active, following the vendor remediation guidance.
  • Review any workflows that let users create or store filenames that are later displayed in the browser.
  • Apply CISA and vendor guidance to reduce exposure in industrial control system administration interfaces.

Evidence notes

The supplied CISA CSAF source (ICSA-25-121-01) identifies affected product KUNBUS Revolution Pi PiCtory: <=2.11.1 and describes an authenticated remote XSS caused by a crafted filename being stored by API endpoints and later rendered without proper escaping. The same advisory lists remediation to update PiCtory to 2.12, recommends activating authentication, and notes that Update A added a new image release for Revolution Pi OS Bookworm in the mitigations. The CVSS vector provided in the source is CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H.

Official resources

CVE-2025-35996 was published on 2025-05-01T06:00:00.000Z and the advisory was modified on 2025-07-10T06:00:00.000Z. CISA’s Update A on that later date added a new Revolution Pi OS Bookworm image release to the mitigations.