Skip to main content

CVE-2021-25968: CWE-79 Cross-site Scripting (XSS) in org.opencms opencms-core

Medium
VulnerabilityCVE-2021-25968cvecve-2021-25968cwe-79
Published: Tue Oct 19 2021 (10/19/2021, 08:15:12 UTC)
Source: CVE
Vendor/Project: org.opencms
Product: opencms-core

Description

In “OpenCMS”, versions 10.5.0 to 11.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the Sitemap functionality. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 06/25/2025, 10:17:07 UTC

Technical Analysis

CVE-2021-25968 is a stored Cross-Site Scripting (XSS) vulnerability identified in the OpenCMS content management system, specifically affecting versions 10.5.0 through 11.0.2 of the opencms-core component. The vulnerability arises from insufficient input sanitization in the Sitemap functionality, which allows low-privileged application users to inject malicious scripts that are persistently stored. When other users, potentially with higher privileges or administrative roles, access pages containing the compromised Sitemap fields, the malicious scripts execute within their browsers. This execution context can lead to unauthorized actions such as session hijacking, theft of sensitive information, or unauthorized commands executed in the context of the victim's session. The vulnerability requires an attacker to have low-level authenticated access to the application, and user interaction is necessary for the exploit to succeed (i.e., the victim must open the affected page). The CVSS 3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, low privileges required, but requiring user interaction and resulting in limited confidentiality and integrity impact without affecting availability. No known public exploits have been reported, but the vulnerability's presence in a widely used CMS component makes it a relevant risk for organizations using OpenCMS for web content management.

Potential Impact

For European organizations utilizing OpenCMS, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of web application data and user sessions. Exploitation could lead to unauthorized disclosure of sensitive information, such as authentication tokens or personal data, which is critical under GDPR regulations. Additionally, attackers could manipulate content or perform actions on behalf of legitimate users, potentially undermining trust and damaging organizational reputation. Since OpenCMS is often used by public sector entities, educational institutions, and medium to large enterprises in Europe, the impact could extend to critical public-facing services and internal portals. The stored nature of the XSS means that once injected, the malicious payload persists and can affect multiple users, increasing the attack surface. However, the requirement for low-privileged user access and user interaction limits the ease of exploitation, reducing the likelihood of widespread automated attacks but still posing a significant threat in targeted scenarios.

Mitigation Recommendations

1. Immediate application of vendor patches or updates is the most effective mitigation; organizations should upgrade to OpenCMS versions later than 11.0.2 where the vulnerability is fixed. 2. If patching is not immediately possible, implement strict input validation and output encoding on the Sitemap fields to neutralize malicious scripts. 3. Restrict the ability to modify Sitemap entries to trusted users only, reducing the risk of malicious script injection by low-privileged users. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5. Conduct regular security audits and penetration testing focused on XSS vulnerabilities in web applications. 6. Educate users, especially administrators, to recognize suspicious content or behavior on CMS pages. 7. Monitor web server and application logs for unusual activity related to Sitemap modifications or unexpected script execution. These measures, combined, reduce the risk of exploitation and limit potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mend
Date Reserved
2021-01-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbedb97

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 6/25/2025, 10:17:07 AM

Last updated: 8/1/2025, 2:38:12 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats