CVE-2025-11289: Cross Site Scripting in westboy CicadasCMS
A vulnerability was determined in westboy CicadasCMS up to 2431154dac8d0735e04f1fd2a3c3556668fc8dab. The impacted element is the function Save of the file src/main/java/com/zhiliao/common/template/TemplateFileServiceImpl.java of the component Template Management Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-11289 is a cross-site scripting (XSS) vulnerability identified in the westboy CicadasCMS product, specifically affecting versions up to commit 2431154dac8d0735e04f1fd2a3c3556668fc8dab. The vulnerability resides in the Save function within the TemplateFileServiceImpl.java file, part of the Template Management Page component. This function improperly handles user input, allowing an attacker to inject malicious scripts that are then executed in the context of the victim's browser. The vulnerability can be exploited remotely without requiring authentication, but user interaction is necessary for the malicious script to execute, such as by tricking a user into visiting a crafted URL or interacting with a manipulated page. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact primarily affects confidentiality and integrity at a limited scope, with no direct impact on availability or system control. Although no public exploits have been observed in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The lack of available patches or mitigations from the vendor at the time of disclosure further elevates the urgency for organizations to implement compensating controls. Given that CicadasCMS is a content management system, exploitation could lead to session hijacking, defacement, or redirection to malicious sites, potentially impacting website visitors and administrators.
Potential Impact
For European organizations using westboy CicadasCMS, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in the browsers of users interacting with the CMS, potentially leading to credential theft, session hijacking, or delivery of malware. This can damage organizational reputation, lead to data breaches, and cause regulatory compliance issues under GDPR due to unauthorized access to personal data. Since the vulnerability affects the template management functionality, attackers might also manipulate website content, causing misinformation or defacement. Organizations relying on CicadasCMS for public-facing websites or internal portals may experience trust erosion and operational disruptions. The medium severity score suggests the impact is not critical but still significant, especially for sectors with high compliance requirements or sensitive user bases.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting access to the Template Management Page, especially the Save function, to trusted administrators only. 2. Implement strict input validation and output encoding on all user-supplied data within the CMS templates to prevent script injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Monitor web server logs and CMS activity for unusual requests or patterns indicative of exploitation attempts. 5. Educate users and administrators about the risks of clicking untrusted links or interacting with suspicious content. 6. If possible, isolate the CMS environment from critical internal networks to limit lateral movement in case of compromise. 7. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 8. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable endpoint.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-11289: Cross Site Scripting in westboy CicadasCMS
Description
A vulnerability was determined in westboy CicadasCMS up to 2431154dac8d0735e04f1fd2a3c3556668fc8dab. The impacted element is the function Save of the file src/main/java/com/zhiliao/common/template/TemplateFileServiceImpl.java of the component Template Management Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-11289 is a cross-site scripting (XSS) vulnerability identified in the westboy CicadasCMS product, specifically affecting versions up to commit 2431154dac8d0735e04f1fd2a3c3556668fc8dab. The vulnerability resides in the Save function within the TemplateFileServiceImpl.java file, part of the Template Management Page component. This function improperly handles user input, allowing an attacker to inject malicious scripts that are then executed in the context of the victim's browser. The vulnerability can be exploited remotely without requiring authentication, but user interaction is necessary for the malicious script to execute, such as by tricking a user into visiting a crafted URL or interacting with a manipulated page. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact primarily affects confidentiality and integrity at a limited scope, with no direct impact on availability or system control. Although no public exploits have been observed in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The lack of available patches or mitigations from the vendor at the time of disclosure further elevates the urgency for organizations to implement compensating controls. Given that CicadasCMS is a content management system, exploitation could lead to session hijacking, defacement, or redirection to malicious sites, potentially impacting website visitors and administrators.
Potential Impact
For European organizations using westboy CicadasCMS, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in the browsers of users interacting with the CMS, potentially leading to credential theft, session hijacking, or delivery of malware. This can damage organizational reputation, lead to data breaches, and cause regulatory compliance issues under GDPR due to unauthorized access to personal data. Since the vulnerability affects the template management functionality, attackers might also manipulate website content, causing misinformation or defacement. Organizations relying on CicadasCMS for public-facing websites or internal portals may experience trust erosion and operational disruptions. The medium severity score suggests the impact is not critical but still significant, especially for sectors with high compliance requirements or sensitive user bases.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting access to the Template Management Page, especially the Save function, to trusted administrators only. 2. Implement strict input validation and output encoding on all user-supplied data within the CMS templates to prevent script injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Monitor web server logs and CMS activity for unusual requests or patterns indicative of exploitation attempts. 5. Educate users and administrators about the risks of clicking untrusted links or interacting with suspicious content. 6. If possible, isolate the CMS environment from critical internal networks to limit lateral movement in case of compromise. 7. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 8. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable endpoint.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-04T18:25:27.740Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e24be4a2a916f2cf693f3b
Added to database: 10/5/2025, 10:43:48 AM
Last enriched: 10/5/2025, 10:43:59 AM
Last updated: 10/5/2025, 12:10:38 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11290: Use of Hard-coded Cryptographic Key in CRMEB
MediumCVE-2025-8917: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in allegroai allegroai/clearml
MediumCVE-2025-8406: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in zenml-io zenml-io/zenml
MediumCVE-2025-11288: SQL Injection in CRMEB
MediumCVE-2025-11287: Improper Authentication in samanhappy MCPHub
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.