Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11306: Cross Site Scripting in qianfox FoxCMS

0
Medium
VulnerabilityCVE-2025-11306cvecve-2025-11306
Published: Sun Oct 05 2025 (10/05/2025, 22:02:07 UTC)
Source: CVE Database V5
Vendor/Project: qianfox
Product: FoxCMS

Description

A vulnerability was found in qianfox FoxCMS up to 1.2. This affects an unknown part of the file /index.php/Search of the component Search Page. The manipulation of the argument keyword results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/13/2025, 00:36:56 UTC

Technical Analysis

CVE-2025-11306 is a cross-site scripting vulnerability identified in qianfox FoxCMS, a content management system, affecting versions 1.0 through 1.2. The flaw resides in the Search Page component, specifically in the handling of the 'keyword' parameter within the /index.php/Search endpoint. Improper sanitization or encoding of this parameter allows an attacker to inject malicious JavaScript code, which is then executed in the context of users visiting the affected page. This vulnerability is remotely exploitable without requiring authentication, but it does require user interaction, such as clicking a crafted link or visiting a malicious page that includes the injected script. The vendor was notified early but has not issued a patch or response, and no known exploits have been observed in the wild yet. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), no impact on confidentiality (VC:N), low impact on integrity (VI:L), no impact on availability (VA:N), and no scope change (S:N). This suggests the primary risk is limited to potential session hijacking, phishing, or defacement through script execution in users’ browsers. The lack of vendor response and absence of patches increases the risk of exploitation once public exploit code becomes widespread. Organizations using FoxCMS should consider this vulnerability critical to their web security posture, especially if the Search Page is publicly accessible and used frequently.

Potential Impact

For European organizations, the impact of this XSS vulnerability can lead to compromised user sessions, theft of sensitive information such as cookies or credentials, and potential phishing attacks leveraging the trusted domain. This can damage organizational reputation, lead to data breaches, and cause regulatory compliance issues under GDPR if personal data is exposed. Public-facing websites using FoxCMS with vulnerable versions are at risk of defacement or delivering malicious payloads to visitors. The medium CVSS score reflects moderate risk, but the ease of exploitation and lack of vendor patching elevate the urgency. Sectors such as media, education, and government websites using FoxCMS are particularly vulnerable due to their public exposure and reliance on user trust. Additionally, the absence of a patch means organizations must rely on mitigations or consider CMS replacement or upgrades. The impact on availability is minimal, but confidentiality and integrity of user interactions are at risk.

Mitigation Recommendations

Since no official patch or update is available from the vendor, European organizations should implement the following specific mitigations: 1) Apply strict input validation and sanitization on the 'keyword' parameter at the web server or application firewall level to block malicious payloads. 2) Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Deploy Web Application Firewalls (WAFs) with custom rules targeting typical XSS attack patterns on the Search Page endpoint. 4) Educate users and administrators about the risks of clicking untrusted links related to the affected site. 5) If feasible, disable or restrict the Search Page functionality until a patch or secure version is available. 6) Monitor logs for suspicious requests containing script tags or unusual input in the keyword parameter. 7) Consider migrating to a more actively maintained CMS or upgrading to a version that addresses this vulnerability once released. 8) Regularly review and update security policies to include this vulnerability and ensure rapid response to any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-04T18:57:41.746Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e2ed7bb3cc4ef154d59724

Added to database: 10/5/2025, 10:13:15 PM

Last enriched: 10/13/2025, 12:36:56 AM

Last updated: 11/20/2025, 12:51:02 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats