Skip to main content

CVE-2022-39325: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in baserproject basercms

Medium
Published: Fri Nov 25 2022 (11/25/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: baserproject
Product: basercms

Description

BaserCMS is a content management system with a japanese language focus. In affected versions there is a cross-site scripting vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. Users of baserCMS are advised to upgrade as soon as possible. There are no known workarounds for this vulnerability.

AI-Powered Analysis

AILast updated: 06/22/2025, 15:07:00 UTC

Technical Analysis

CVE-2022-39325 is a cross-site scripting (XSS) vulnerability identified in baserCMS, a content management system primarily focused on the Japanese language market. The vulnerability is categorized under CWE-79, which involves improper neutralization of input during web page generation. Specifically, this flaw exists in the management system component of baserCMS versions prior to 4.7.2. The vulnerability allows an attacker to inject malicious scripts into web pages viewed by other users of the management interface. This can lead to the execution of arbitrary JavaScript code in the context of the victim's browser session. The attack vector typically involves the attacker submitting crafted input that is not properly sanitized or encoded before being rendered in the management system's web pages. As a result, the malicious script can steal session cookies, perform actions on behalf of the user, or redirect users to malicious sites. The vulnerability requires the attacker to have access to the management system interface, which may be restricted to authenticated users, but the exact authentication requirements are not explicitly stated. There are no known workarounds for this vulnerability, and users are strongly advised to upgrade to baserCMS version 4.7.2 or later where the issue has been fixed. No public exploits have been reported in the wild as of the publication date (November 25, 2022).

Potential Impact

For European organizations using baserCMS, especially those with multiple users accessing the management system, this vulnerability poses a risk to the confidentiality and integrity of administrative sessions. Successful exploitation could allow attackers to hijack administrator sessions, modify website content, or inject malicious content into the managed websites, potentially damaging the organization's reputation and leading to data breaches. The impact on availability is limited, as XSS typically does not directly disrupt service. However, indirect effects such as defacement or phishing could have operational consequences. Since baserCMS is focused on the Japanese language market, its adoption in Europe is likely limited but not negligible, particularly among niche organizations or those with ties to Japanese markets. Organizations that have deployed baserCMS in Europe should consider this vulnerability seriously, especially if the management system is accessible over the internet or shared among multiple administrators. The lack of known exploits reduces immediate risk, but the medium severity rating and absence of workarounds necessitate prompt remediation to prevent potential targeted attacks.

Mitigation Recommendations

The primary mitigation is to upgrade baserCMS to version 4.7.2 or later, where the vulnerability has been addressed. Organizations should audit their baserCMS installations to identify affected versions and prioritize patching. Additionally, restricting access to the management system via network controls such as VPNs, IP whitelisting, or firewall rules can reduce exposure. Implementing strong authentication mechanisms, including multi-factor authentication (MFA), can limit the risk of unauthorized access. Web application firewalls (WAFs) configured to detect and block XSS payloads may provide temporary protection but are not a substitute for patching. Administrators should also review user privileges to ensure that only trusted users have access to the management interface. Regular monitoring of logs for suspicious activity related to the management system is recommended to detect potential exploitation attempts early. Finally, educating users about the risks of XSS and safe browsing practices can help mitigate the impact of any successful attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf48a3

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 3:07:00 PM

Last updated: 7/30/2025, 11:29:18 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats