SOCET GXP Vulnerabilities Disclosure

The following vulnerabilities have been fixed in the below releases of SOCET GXP® software from BAE Systems, Inc.

SOCET GXP v4.6.0.3

CVE-2025-54967 – XXE injection in SOCET GXP file processing

CVE
CVE-2025-54967
Description
SOCET GXP does not prevent XML External Entities (XXE) in certain XML files. An attacker who can trick a SOCET GXP user into opening a specially-crafted, malicious XML file (e.g., a saved workspace) may be able to cause SOCET GXP to make HTTP or other network requests on the user’s behalf without the user’s awareness, potentially leaking sensitive information in the process.
Mitigations
Users are encouraged to update to SOCET GXP v 4.6.0.3. No other technical mitigations are currently available. Exploitation of this vulnerability relies on a user opening a specially crafted, malicious XML file. As always, users should only open files from trusted sources.
Affected Versions
SOCET GXP v4.6.0.2 and earlier.

SOCET GXP v4.6.0.2

CVE-2025-54965 – Reflected Cross-Site Scripting in GXP® Job Service

CVE
CVE-2025-54965
Description
The SOCET GXP Job Status Service does not properly sanitize the job ID parameter before using it in the job status page. An attacker who can social engineer a user into clicking a malicious link may be able to execute arbitrary JavaScript™ in the victim's browser.
Mitigations
Users are encouraged to update to SOCET GXP v 4.6.0.3, which removes the HTTP-based job status service web page entirely, or v4.6.0.2 which disables the HTTP-based job status service by default. If upgrading is not possible, we encourage users to disable the Job Status Service HTTP endpoint manually by changing <HTTP_SERVER enabled=”true”> to <HTTP_SERVER enabled=”false”> in <SOCET GXP Installation Directory>/Config/GXPJobService/js-config.xml, then restart SOCET GXP. Leave that setting in place until SOCET GXP can be updated. Exploitation of this vulnerability relies on successful social engineering; proper caution when clicking links from untrusted sources will reduce the probability of this vulnerability being exploited.
Affected Versions
SOCET GXP v4.6.0.1 and earlier.

CVE-2025-54964 – Command injection in SOCET GXP Job Service

CVE
CVE-2025-54964
Description
The SOCET GXP Job Service defaults to permitting connections from all IP addresses. If the job service is not reconfigured at install-time, and if it is permitted through the local Windows® Firewall (or if the firewall is disabled), this may allow a remote attacker with the ability to send network traffic to the SOCET GXP Job Service to execute arbitrary commands with the privileges of the SOCET GXP Job Service. In Basic mode, the SOCET GXP Job Service runs only when SOCET GXP is running, with the permissions of the user that launched SOCET GXP.
Mitigations
Users are encouraged to update to SOCET GXP v 4.6.0.2, which disables network access for the GXP Job Service by default. Users who are unable to immediately update can restrict network access to the GXP Job Service by removing allowed IPs from the Job Service configuration window or by blocking access to the job service ports in the Windows firewall. Please contact your Customer Technical Support representative if you need assistance implementing these changes.
Affected Versions
SOCET GXP v4.6.0.1 and earlier.

CVE-2025-54963 – Path Traversal may allow arbitrary file read in SOCET GXP Job Service

CVE
CVE-2025-54963
Description
The SOCET GXP Job Service permits users to specify the location of the log file for a job and does not sanitize that input. An attacker may submit a job with a log file location of a sensitive file and use the log monitoring feature to read that file’s contents. Access to the log file is limited by the permissions of the user that the Job Service is running as. In Basic mode, the SOCET GXP job service runs with the permissions of the currently logged-on user.
Mitigations
Users are encouraged to update to SOCET GXP v 4.6.0.2, which disables network access for the GXP Job Service by default. Users who are unable to immediately update can restrict network access to the GXP Job Service by removing allowed IPs from the Job Service configuration window and by blocking access to the job service ports in the Windows firewall. Please contact your Customer Technical Support representative if you need assistance implementing these changes.
Affected Versions
SOCET GXP v4.6.0.1 and earlier.

CVE-2025-54968 – Unauthenticated access to the GXP Job Service on Port 41110

CVE
CVE-2025-54968
Description
The Job service does not require authentication prior to accepting and processing jobs. If the service running in basic mode is improperly configured to accept non-local traffic, an unauthenticated attacker with the ability to interact with the GXP Job Service port may be able to submit jobs to the Job Service for processing.
Mitigations
Users are encouraged to update to SOCET GXP v 4.6.0.2, which disables network access for the GXP Job Service by default. Users who are unable to immediately update can restrict network access to the GXP Job Service by removing allowed IPs from the Job Service configuration window and by blocking access to the job service ports in the Windows firewall. Please contact your Customer Technical Support representative if you need assistance implementing these changes.
Affected Versions
SOCET GXP v4.6.0.1 and earlier.

CVE-2025-54970 – Unauthenticated access to the GXP Job Status service on Port 1344

CVE
CVE-2025-54970
Description
The GXP Job Status Service does not require authentication prior to providing job status or performing other actions supported by the API.
Mitigations
Users are encouraged to update to SOCET GXP v 4.6.0.2, which disables network access for the GXP Job Service by default. Users who are unable to immediately update can restrict network access to the GXP Job Service by removing allowed IPs from the Job Service configuration window or by blocking access to the job service ports in the Windows firewall. Please contact your Customer Technical Support representative if you need assistance implementing these changes.
Affected Versions
SOCET GXP v4.6.0.1 and earlier.

CVE-2025-54969 – Client-Side Request Forgery in the GXP Job Status Service

CVE
CVE-2025-54969
Description
The GXP Job Status Service does not implement any form of session mechanism, nor any user-only secrets. As such, an attacker has all the information required to social engineer a user into submitting a valid request to the server. If the social engineering is successful, the request will originate from localhost, bypassing network restrictions. Furthermore, some of the API endpoints that are vulnerable to CSRF change the state of the server, allowing a successful attacker to purge job information, abort jobs, or even restart the Job Status Service.
Mitigations
Users are encouraged to update to SOCET GXP v 4.6.0.2, which disables network accessibility for this service, or 4.6.0.3, which removes this service completely. There is no immediate technical mitigation for this vulnerability for users who are unable to update. Standard user best practices for validating links prior to clicking them apply, but that does not constitute a reliable mitigation.
Affected Versions
SOCET GXP v4.6.0.1 and earlier.

CVE-2025-54966 – Information Disclosure in the GXP Job Status Service

CVE
CVE-2025-54966
Description
The GXP Job Status Service, if configured to accept non-local traffic, may allow an attacker to leak potentially sensitive information from the system. This includes configuration information, log files, and service version information. An adversary may use this information to inform other attacks.
Mitigations
Users are encouraged to update to SOCET GXP v 4.6.0.2, which disables network accessibility for this service, or 4.6.0.3, which removes this service completely. If upgrading is not possible, we encourage users to disable the Job Status Service HTTP endpoint manually by changing <HTTP_SERVER enabled=”true”> to <HTTP_SERVER enabled=”false”> in <SOCET GXP Installation Directory>/Config/GXPJobService/js-config.xml, then restart SOCET GXP. Leave that setting in place until SOCET GXP can be updated. In Basic mode, this configuration will limit requests only the currently logged-on user. Since the job status service runs with the permission of the logged-on user, any information that may be disclosed via this service is already information the user can read directly using easier tools, such as Notepad.
Affected Versions
SOCET GXP v4.6.0.1 and earlier.

Table of Contents