CVE-2018-19905: n/a in n/a
HTML injection exists in razorCMS 3.4.8 via the /#/page keywords parameter.
AI Analysis
Technical Summary
CVE-2018-19905 is a medium-severity vulnerability identified in razorCMS version 3.4.8. The issue is an HTML injection vulnerability occurring via the /#/page keywords parameter. HTML injection, classified under CWE-79, allows an attacker to inject malicious HTML code into a web page viewed by other users. This can lead to cross-site scripting (XSS) attacks or manipulation of the page content, potentially compromising user data or session integrity. The vulnerability requires network access (AV:N), has low attack complexity (AC:L), requires privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent (C:L/I:L), but does not affect availability (A:N). No known exploits are reported in the wild, and no official patches are listed, which suggests that organizations using razorCMS 3.4.8 may remain exposed if they have not implemented custom mitigations or updates. razorCMS is a content management system used to build and manage websites, so this vulnerability could allow attackers to inject malicious content into web pages, potentially leading to phishing, session hijacking, or defacement.
Potential Impact
For European organizations using razorCMS 3.4.8, this vulnerability poses a risk primarily to the confidentiality and integrity of their web content and user interactions. Attackers exploiting this flaw could inject malicious HTML or scripts, potentially leading to theft of user credentials, session tokens, or manipulation of displayed information. This could damage organizational reputation, lead to data breaches involving personal data protected under GDPR, and cause compliance issues. Since razorCMS is often used by small to medium enterprises and public sector entities for website management, the impact could be significant if exploited on sites handling sensitive user data or providing critical services. The requirement for user interaction and privileges limits the ease of exploitation but does not eliminate risk, especially if internal users or contributors have access to vulnerable parameters. The absence of known exploits reduces immediate threat but does not guarantee safety, as attackers may develop exploits over time.
Mitigation Recommendations
Organizations should first verify if they are running razorCMS version 3.4.8 or earlier and assess exposure of the /#/page keywords parameter. Since no official patches are listed, mitigation should include implementing strict input validation and sanitization on all user-supplied data, especially parameters that influence page content. Employ Content Security Policy (CSP) headers to restrict execution of injected scripts. Limit privileges of users who can access or modify page keywords parameters to reduce risk of exploitation. Regularly monitor web application logs for suspicious activity related to this parameter. Consider upgrading to a later razorCMS version if available or applying community patches addressing this vulnerability. Additionally, conduct security awareness training to reduce risk from social engineering that might facilitate user interaction required for exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2018-19905: n/a in n/a
Description
HTML injection exists in razorCMS 3.4.8 via the /#/page keywords parameter.
AI-Powered Analysis
Technical Analysis
CVE-2018-19905 is a medium-severity vulnerability identified in razorCMS version 3.4.8. The issue is an HTML injection vulnerability occurring via the /#/page keywords parameter. HTML injection, classified under CWE-79, allows an attacker to inject malicious HTML code into a web page viewed by other users. This can lead to cross-site scripting (XSS) attacks or manipulation of the page content, potentially compromising user data or session integrity. The vulnerability requires network access (AV:N), has low attack complexity (AC:L), requires privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent (C:L/I:L), but does not affect availability (A:N). No known exploits are reported in the wild, and no official patches are listed, which suggests that organizations using razorCMS 3.4.8 may remain exposed if they have not implemented custom mitigations or updates. razorCMS is a content management system used to build and manage websites, so this vulnerability could allow attackers to inject malicious content into web pages, potentially leading to phishing, session hijacking, or defacement.
Potential Impact
For European organizations using razorCMS 3.4.8, this vulnerability poses a risk primarily to the confidentiality and integrity of their web content and user interactions. Attackers exploiting this flaw could inject malicious HTML or scripts, potentially leading to theft of user credentials, session tokens, or manipulation of displayed information. This could damage organizational reputation, lead to data breaches involving personal data protected under GDPR, and cause compliance issues. Since razorCMS is often used by small to medium enterprises and public sector entities for website management, the impact could be significant if exploited on sites handling sensitive user data or providing critical services. The requirement for user interaction and privileges limits the ease of exploitation but does not eliminate risk, especially if internal users or contributors have access to vulnerable parameters. The absence of known exploits reduces immediate threat but does not guarantee safety, as attackers may develop exploits over time.
Mitigation Recommendations
Organizations should first verify if they are running razorCMS version 3.4.8 or earlier and assess exposure of the /#/page keywords parameter. Since no official patches are listed, mitigation should include implementing strict input validation and sanitization on all user-supplied data, especially parameters that influence page content. Employ Content Security Policy (CSP) headers to restrict execution of injected scripts. Limit privileges of users who can access or modify page keywords parameters to reduce risk of exploitation. Regularly monitor web application logs for suspicious activity related to this parameter. Consider upgrading to a later razorCMS version if available or applying community patches addressing this vulnerability. Additionally, conduct security awareness training to reduce risk from social engineering that might facilitate user interaction required for exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2018-12-06T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbda047
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 4:58:27 PM
Last updated: 8/9/2025, 7:28:57 PM
Views: 9
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.