The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next').
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 09 Jan 2026 04:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 03 Jan 2026 04:00:00 +0900

Type Values Removed Values Added
First Time appeared Cisa software Acquisition Guide
CPEs cpe:2.3:a:cisa:software_acquisition_guide:*:*:*:*:*:*:*:*
Vendors & Products Cisa software Acquisition Guide

Mon, 15 Dec 2025 06:30:00 +0900

Type Values Removed Values Added
First Time appeared Cisa
Cisa software Acquisition Guide Tool
Vendors & Products Cisa
Cisa software Acquisition Guide Tool

Sat, 13 Dec 2025 05:45:00 +0900

Type Values Removed Values Added
Description The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next').
Title Software Acquisition Guide Supplier Response Web Tool XSS
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}

cvssV4_0

{'score': 4.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published:

Updated: 2026-01-08T18:13:27.307Z

Reserved: 2025-12-09T17:06:11.269Z

Link: CVE-2025-67634

cve-icon Vulnrichment

Updated: 2026-01-08T18:13:15.096Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-12T21:15:59.480

Modified: 2026-01-02T18:52:18.527

Link: CVE-2025-67634

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-15T06:15:39Z

Weaknesses