Skip to main content

CVE-2025-11068: Cross Site Scripting in westboy CicadasCMS

Medium
VulnerabilityCVE-2025-11068cvecve-2025-11068
Published: Sat Sep 27 2025 (09/27/2025, 16:02:05 UTC)
Source: CVE Database V5
Vendor/Project: westboy
Product: CicadasCMS

Description

A vulnerability was found in westboy CicadasCMS 1.0. Affected by this vulnerability is an unknown functionality of the file /system/cms/category/save. The manipulation of the argument categoryName results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 09/27/2025, 16:16:57 UTC

Technical Analysis

CVE-2025-11068 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of westboy's CicadasCMS, specifically within the /system/cms/category/save endpoint. The vulnerability arises from improper sanitization or validation of the 'categoryName' parameter, allowing an attacker to inject malicious scripts. This flaw can be exploited remotely without requiring authentication but does require user interaction, such as a victim visiting a crafted URL or interacting with manipulated content. The vulnerability has a CVSS 4.8 (medium) score, reflecting moderate impact and exploitability. The attack vector is network-based with low attack complexity, no privileges required, but user interaction is necessary. The vulnerability impacts confidentiality minimally, with limited integrity and availability impact, primarily enabling script execution in the context of the victim's browser. Although no public exploit in the wild has been reported yet, the existence of a public exploit code increases the risk of exploitation. The vulnerability could be leveraged for session hijacking, phishing, or delivering further malware payloads through the CMS interface, potentially compromising user data or administrative sessions.

Potential Impact

For European organizations using CicadasCMS 1.0, this vulnerability poses a risk of client-side attacks that can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. Given the CMS nature, attackers could target administrative users or content managers, potentially leading to defacement or unauthorized content injection. While the direct impact on backend systems is limited, the reputational damage and potential data leakage through compromised user sessions can be significant. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or government, may face compliance risks if user data is exposed. Additionally, the medium severity and public exploit availability necessitate prompt attention to avoid exploitation in targeted attacks or automated scanning campaigns.

Mitigation Recommendations

1. Immediate patching or upgrading to a fixed version of CicadasCMS once available is the most effective mitigation. 2. In the absence of an official patch, implement input validation and output encoding on the 'categoryName' parameter to neutralize malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of XSS attacks. 4. Use web application firewalls (WAFs) with updated signatures to detect and block malicious payloads targeting this endpoint. 5. Conduct regular security audits and penetration testing focusing on input validation in CMS components. 6. Educate users and administrators about phishing risks and suspicious links to reduce successful exploitation via user interaction. 7. Monitor logs for unusual requests to /system/cms/category/save and anomalous user behavior indicating exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T12:09:15.595Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d80d1139084229f5337fc9

Added to database: 9/27/2025, 4:13:05 PM

Last enriched: 9/27/2025, 4:16:57 PM

Last updated: 9/27/2025, 10:33:01 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats