Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11019: Cross Site Scripting in Total.js CMS

0
Medium
VulnerabilityCVE-2025-11019cvecve-2025-11019
Published: Fri Sep 26 2025 (09/26/2025, 14:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Total.js
Product: CMS

Description

A vulnerability has been found in Total.js CMS up to 19.9.0. This impacts an unknown function of the component Files Menu. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/26/2025, 14:40:44 UTC

Technical Analysis

CVE-2025-11019 is a cross-site scripting (XSS) vulnerability identified in Total.js CMS versions up to 19.9.0, specifically affecting an unspecified function within the Files Menu component. This vulnerability allows an attacker to inject malicious scripts that execute in the context of the victim's browser. The attack can be initiated remotely without requiring authentication, although user interaction is necessary for the malicious script to execute (e.g., a user clicking a crafted link or visiting a malicious page). The CVSS 4.0 base score is 4.8, indicating a medium severity level. The vector details show that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the vector states PR:H which conflicts with the description; given the description states no authentication required, this may be a discrepancy), and user interaction is required (UI:P). The vulnerability impacts confidentiality and integrity to a limited extent (VI:L), with no impact on availability or system components. Although no public exploits are currently known in the wild, the vulnerability has been disclosed publicly, which increases the risk of exploitation. The lack of patches or mitigation links suggests that vendors or maintainers have not yet released an official fix, making it critical for users to implement interim protective measures. XSS vulnerabilities can be leveraged to steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious sites, potentially leading to further compromise of the affected web application or user data.

Potential Impact

For European organizations using Total.js CMS, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized actions performed in the context of legitimate users, potentially exposing sensitive data or enabling phishing attacks. Organizations in sectors such as government, finance, healthcare, and e-commerce, where CMS platforms are used to manage public-facing or internal content, could face reputational damage, regulatory penalties under GDPR if personal data is compromised, and operational disruptions. The remote nature of the attack vector means that attackers do not need physical access or insider privileges, increasing the threat landscape. However, the requirement for user interaction limits automated exploitation, somewhat reducing the immediacy of the threat. Still, targeted spear-phishing or social engineering campaigns could leverage this vulnerability effectively. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially given the public disclosure.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Immediately audit all Total.js CMS installations to identify affected versions (19.0 through 19.9.0). 2) Apply any available patches or updates from Total.js as soon as they are released. In absence of official patches, implement input validation and output encoding on the Files Menu component to sanitize user inputs and prevent script injection. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the CMS. 4) Educate users and administrators about the risks of clicking untrusted links and the importance of verifying URLs, to reduce the risk of successful user interaction exploitation. 5) Monitor web server and application logs for unusual or suspicious requests targeting the Files Menu or related endpoints. 6) Consider deploying Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the CMS environment. 7) Regularly review and update incident response plans to include scenarios involving XSS exploitation. These steps go beyond generic advice by focusing on specific components and practical controls tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T06:58:58.490Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d6a5c85686aca512dbede9

Added to database: 9/26/2025, 2:40:08 PM

Last enriched: 9/26/2025, 2:40:44 PM

Last updated: 11/16/2025, 7:28:59 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats