Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)
Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)
AI Analysis
Technical Summary
Anchor CMS version 0.12.7 contains a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-46041. This vulnerability exists in the 'markdown' input field of the administrative page creation interface (/admin/pages/add). An authenticated user with privileges to create pages can inject arbitrary JavaScript code into this field. The injected script is then stored persistently on the server and executed whenever the affected page is viewed by any user with access to that page. The exploit was tested on a typical LAMP stack environment (Ubuntu 22.04, Apache2, PHP 8.1). The attack vector requires authentication and page creation rights, which limits the initial access but still poses a significant risk within the administrative context. Successful exploitation can lead to arbitrary JavaScript execution in the context of the victim's browser session, enabling session hijacking, credential theft, or impersonation of administrative users. The exploit code is provided in plain text format and demonstrates a simple injection of a script alerting the document domain, confirming the vulnerability's presence and ease of exploitation. No official patch or mitigation link is provided, indicating that organizations must rely on other protective measures until an official fix is released.
Potential Impact
For European organizations using Anchor CMS 0.12.7, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of administrative sessions. Attackers who gain authenticated access to the CMS backend can embed malicious scripts that execute in the browsers of other administrators or privileged users viewing the compromised pages. This can lead to session hijacking, unauthorized actions performed under the guise of legitimate admins, and potential lateral movement within the CMS environment. Given that Anchor CMS is a lightweight content management system often used by small to medium enterprises, non-profits, and personal websites, the impact may be more pronounced in organizations relying heavily on web presence and administrative integrity. The vulnerability does not directly affect availability but could indirectly cause service disruption if administrative accounts are compromised or if malicious scripts deface content. The lack of known exploits in the wild currently reduces immediate risk, but the public availability of exploit code increases the likelihood of future attacks. European organizations with limited security monitoring or weak internal access controls are particularly vulnerable.
Mitigation Recommendations
1. Restrict administrative access strictly to trusted personnel and enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of unauthorized page creation. 2. Implement strict input validation and output encoding on the markdown field to sanitize user input and prevent script injection. If possible, deploy a Web Application Firewall (WAF) with rules targeting stored XSS payloads specific to Anchor CMS administrative URLs. 3. Monitor and audit administrative actions and page content changes regularly to detect suspicious script insertions early. 4. Isolate the CMS administrative interface behind VPN or IP allowlists to limit exposure. 5. Until an official patch is released, consider disabling or restricting the markdown input field or the page creation feature for non-essential users. 6. Educate administrators about the risks of XSS and encourage cautious behavior when interacting with CMS content. 7. Follow Anchor CMS official channels for updates and apply patches promptly once available. 8. Consider migrating to a more actively maintained CMS if long-term support for Anchor CMS 0.12.7 is uncertain.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
Indicators of Compromise
- exploit-code: # Exploit Title: Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS) # Google Dork: inurl:"/admin/pages/add" "Anchor CMS" # Date: 2025-06-08 # Exploit Author: /bin/neko # Vendor Homepage: http://anchorcms.com # Software Link: https://github.com/anchorcms/anchor-cms # Version: 0.12.7 # Tested on: Ubuntu 22.04 + Apache2 + PHP 8.1 # CVE: CVE-2025-46041 # Description: Anchor CMS v0.12.7 suffers from a stored Cross-Site Scripting (XSS) vulnerability in the `markdown` field of the /admin/pages/add page. An authenticated user with page creation privileges can inject arbitrary JavaScript, which is stored and executed when the page is viewed. # Steps to Reproduce: 1. Login to /admin 2. Navigate to Pages > Add Page 3. In the `Markdown` field, insert: <script>alert(document.domain)</script> 4. Save the page. 5. View the created page. The script executes. # Impact: - Arbitrary JavaScript execution - Potential session hijacking or admin impersonation
Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)
Description
Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)
AI-Powered Analysis
Technical Analysis
Anchor CMS version 0.12.7 contains a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-46041. This vulnerability exists in the 'markdown' input field of the administrative page creation interface (/admin/pages/add). An authenticated user with privileges to create pages can inject arbitrary JavaScript code into this field. The injected script is then stored persistently on the server and executed whenever the affected page is viewed by any user with access to that page. The exploit was tested on a typical LAMP stack environment (Ubuntu 22.04, Apache2, PHP 8.1). The attack vector requires authentication and page creation rights, which limits the initial access but still poses a significant risk within the administrative context. Successful exploitation can lead to arbitrary JavaScript execution in the context of the victim's browser session, enabling session hijacking, credential theft, or impersonation of administrative users. The exploit code is provided in plain text format and demonstrates a simple injection of a script alerting the document domain, confirming the vulnerability's presence and ease of exploitation. No official patch or mitigation link is provided, indicating that organizations must rely on other protective measures until an official fix is released.
Potential Impact
For European organizations using Anchor CMS 0.12.7, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of administrative sessions. Attackers who gain authenticated access to the CMS backend can embed malicious scripts that execute in the browsers of other administrators or privileged users viewing the compromised pages. This can lead to session hijacking, unauthorized actions performed under the guise of legitimate admins, and potential lateral movement within the CMS environment. Given that Anchor CMS is a lightweight content management system often used by small to medium enterprises, non-profits, and personal websites, the impact may be more pronounced in organizations relying heavily on web presence and administrative integrity. The vulnerability does not directly affect availability but could indirectly cause service disruption if administrative accounts are compromised or if malicious scripts deface content. The lack of known exploits in the wild currently reduces immediate risk, but the public availability of exploit code increases the likelihood of future attacks. European organizations with limited security monitoring or weak internal access controls are particularly vulnerable.
Mitigation Recommendations
1. Restrict administrative access strictly to trusted personnel and enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of unauthorized page creation. 2. Implement strict input validation and output encoding on the markdown field to sanitize user input and prevent script injection. If possible, deploy a Web Application Firewall (WAF) with rules targeting stored XSS payloads specific to Anchor CMS administrative URLs. 3. Monitor and audit administrative actions and page content changes regularly to detect suspicious script insertions early. 4. Isolate the CMS administrative interface behind VPN or IP allowlists to limit exposure. 5. Until an official patch is released, consider disabling or restricting the markdown input field or the page creation feature for non-essential users. 6. Educate administrators about the risks of XSS and encourage cautious behavior when interacting with CMS content. 7. Follow Anchor CMS official channels for updates and apply patches promptly once available. 8. Consider migrating to a more actively maintained CMS if long-term support for Anchor CMS 0.12.7 is uncertain.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Edb Id
- 52327
- Has Exploit Code
- true
- Code Language
- text
Indicators of Compromise
Exploit Source Code
Exploit code for Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)
# Exploit Title: Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS) # Google Dork: inurl:"/admin/pages/add" "Anchor CMS" # Date: 2025-06-08 # Exploit Author: /bin/neko # Vendor Homepage: http://anchorcms.com # Software Link: https://github.com/anchorcms/anchor-cms # Version: 0.12.7 # Tested on: Ubuntu 22.04 + Apache2 + PHP 8.1 # CVE: CVE-2025-46041 # Description: Anchor CMS v0.12.7 suffers from a stored Cross-Site Scripting (XSS) vulnerability in the `markdown` field of the /admin/pages/add
... (459 more characters)
Threat ID: 684fad5ba8c921274383b10f
Added to database: 6/16/2025, 5:36:27 AM
Last enriched: 6/16/2025, 5:38:28 AM
Last updated: 6/16/2025, 10:50:34 AM
Views: 3
Related Threats
PCMan FTP Server 2.0.7 - Buffer Overflow
MediumLitespeed Cache WordPress Plugin 6.3.0.1 - Privilege Escalation
HighParrot and DJI variants Drone OSes - Kernel Panic Exploit
MediumWindows 11 SMB Client - Privilege Escalation & Remote Code Execution (RCE)
CriticalPHP CGI Module 8.3.4 - Remote Code Execution (RCE)
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.