Skip to main content

CVE-2025-10330: Cross Site Scripting in cdevroe unmark

Medium
VulnerabilityCVE-2025-10330cvecve-2025-10330
Published: Fri Sep 12 2025 (09/12/2025, 23:02:07 UTC)
Source: CVE Database V5
Vendor/Project: cdevroe
Product: unmark

Description

A flaw has been found in cdevroe unmark up to 1.9.3. This vulnerability affects unknown code of the file application/views/layouts/topbar/searchform.php. This manipulation of the argument q causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/12/2025, 23:09:43 UTC

Technical Analysis

CVE-2025-10330 is a cross-site scripting (XSS) vulnerability identified in the cdevroe unmark application, specifically affecting versions 1.9.0 through 1.9.3. The vulnerability resides in the file application/views/layouts/topbar/searchform.php, where improper handling of the 'q' parameter allows an attacker to inject malicious scripts. This flaw enables remote attackers to execute arbitrary JavaScript code in the context of the victim's browser when they interact with the vulnerable search form. The vulnerability does not require any authentication or privileges to exploit, and user interaction is necessary only to the extent that a victim must visit a crafted URL or interact with a manipulated search form. The CVSS v4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, but requiring user interaction and resulting in limited integrity impact without confidentiality or availability impact. Although the vendor was notified early, there has been no response or patch released to date. While no known exploits are currently observed in the wild, proof-of-concept code has been published, increasing the risk of exploitation. The vulnerability's exploitation could lead to session hijacking, credential theft, or other malicious actions performed in the context of the affected web application users.

Potential Impact

For European organizations using cdevroe unmark versions 1.9.0 to 1.9.3, this vulnerability poses a moderate risk. Unmark is a self-hosted bookmarking and note-taking application, often used by individuals and small to medium enterprises to manage links and notes. Successful exploitation could allow attackers to execute scripts in users' browsers, potentially leading to theft of session cookies, redirection to malicious sites, or unauthorized actions performed on behalf of the user. This could compromise user accounts and sensitive organizational data stored or accessed via the application. While the impact on critical infrastructure is limited due to the nature of the product, organizations relying on unmark for internal knowledge management or collaboration could face confidentiality breaches and user trust erosion. The lack of vendor response and patches increases exposure time, and the published exploit code raises the likelihood of targeted attacks. Given the medium severity and the requirement for user interaction, the threat is significant but not critical. European organizations with web-facing instances of unmark should be vigilant, especially those in sectors handling sensitive information or regulated data.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first assess whether they are running affected versions (1.9.0 to 1.9.3) of cdevroe unmark. Immediate steps include implementing web application firewall (WAF) rules to detect and block malicious payloads targeting the 'q' parameter in search requests. Input validation and output encoding should be enforced at the application level to sanitize user-supplied input, particularly in the search form. If possible, disable or restrict the search functionality temporarily until a patch or update is available. Organizations should monitor web server logs for suspicious requests containing script tags or unusual query parameters. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the application. Additionally, educate users about the risks of clicking on untrusted links and encourage the use of updated browsers with built-in XSS protections. Since no official patch exists, consider contributing to or requesting a fix from the community or exploring alternative software solutions if remediation is delayed. Regular backups and incident response plans should be reviewed to prepare for potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T08:46:03.723Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c4a8226da8ad0abf36919f

Added to database: 9/12/2025, 11:09:22 PM

Last enriched: 9/12/2025, 11:09:43 PM

Last updated: 9/13/2025, 12:01:58 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats