Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11289: Cross Site Scripting in westboy CicadasCMS

0
Medium
VulnerabilityCVE-2025-11289cvecve-2025-11289
Published: Sun Oct 05 2025 (10/05/2025, 10:32:05 UTC)
Source: CVE Database V5
Vendor/Project: westboy
Product: CicadasCMS

Description

A vulnerability was determined in westboy CicadasCMS up to 2431154dac8d0735e04f1fd2a3c3556668fc8dab. The impacted element is the function Save of the file src/main/java/com/zhiliao/common/template/TemplateFileServiceImpl.java of the component Template Management Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 10/13/2025, 00:38:54 UTC

Technical Analysis

CVE-2025-11289 is a cross-site scripting vulnerability identified in the westboy CicadasCMS product, specifically affecting versions up to commit 2431154dac8d0735e04f1fd2a3c3556668fc8dab. The vulnerability resides in the Save function of the Template Management Page, implemented in the TemplateFileServiceImpl.java file. This function fails to properly sanitize user input before processing template files, allowing an attacker to inject malicious JavaScript code. The vulnerability can be triggered remotely without authentication, but requires user interaction, such as an administrator or editor saving a crafted template. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H means high privileges required, but the vector states PR:H which is contradictory; assuming PR:H means privileges required), user interaction required (UI:P), and limited impact on confidentiality (C:N), integrity (I:L), and no impact on availability (A:N). The exploit could lead to session hijacking, credential theft, or unauthorized actions performed in the context of the victim's browser session. Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations, this XSS vulnerability poses a risk primarily to the confidentiality and integrity of web sessions managed via CicadasCMS. Successful exploitation could allow attackers to execute arbitrary scripts in the context of administrative users, potentially leading to credential theft, session hijacking, or unauthorized content manipulation. This could result in defacement, data leakage, or further compromise of internal systems. Organizations with public-facing CMS management portals are particularly vulnerable. The medium severity rating reflects that while the vulnerability is exploitable remotely, it requires user interaction and privileges, limiting the attack surface. However, given the public disclosure and potential for targeted attacks, the threat should not be underestimated. The impact is heightened for sectors relying heavily on web content management for critical communications or e-commerce, including government, media, and financial institutions across Europe.

Mitigation Recommendations

1. Monitor for official patches or updates from westboy and apply them promptly once released. 2. Implement strict input validation and output encoding on all template management inputs to prevent injection of malicious scripts. 3. Employ Web Application Firewalls (WAFs) configured to detect and block common XSS payloads targeting the affected CMS components. 4. Restrict access to the Template Management Page to trusted users and networks, using VPNs or IP whitelisting where possible. 5. Conduct regular security audits and penetration testing focusing on CMS components to identify and remediate similar vulnerabilities. 6. Educate administrators and editors about the risks of interacting with untrusted content or links that could trigger XSS attacks. 7. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS exploitation by restricting script execution sources. 8. Monitor logs for suspicious activities related to template saving operations to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-04T18:25:27.740Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e24be4a2a916f2cf693f3b

Added to database: 10/5/2025, 10:43:48 AM

Last enriched: 10/13/2025, 12:38:54 AM

Last updated: 11/20/2025, 8:08:56 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats