CVE-2025-11306: Cross Site Scripting in qianfox FoxCMS
A vulnerability was found in qianfox FoxCMS up to 1.2. This affects an unknown part of the file /index.php/Search of the component Search Page. The manipulation of the argument keyword results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11306 is a cross-site scripting vulnerability identified in qianfox FoxCMS, a content management system, affecting versions 1.0 through 1.2. The flaw resides in the Search Page component, specifically in the handling of the 'keyword' parameter within the /index.php/Search endpoint. Improper sanitization or encoding of this parameter allows an attacker to inject malicious JavaScript code, which is then executed in the context of users visiting the affected page. This vulnerability is remotely exploitable without requiring authentication, but it does require user interaction, such as clicking a crafted link or visiting a malicious page that includes the injected script. The vendor was notified early but has not issued a patch or response, and no known exploits have been observed in the wild yet. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), no impact on confidentiality (VC:N), low impact on integrity (VI:L), no impact on availability (VA:N), and no scope change (S:N). This suggests the primary risk is limited to potential session hijacking, phishing, or defacement through script execution in users’ browsers. The lack of vendor response and absence of patches increases the risk of exploitation once public exploit code becomes widespread. Organizations using FoxCMS should consider this vulnerability critical to their web security posture, especially if the Search Page is publicly accessible and used frequently.
Potential Impact
For European organizations, the impact of this XSS vulnerability can lead to compromised user sessions, theft of sensitive information such as cookies or credentials, and potential phishing attacks leveraging the trusted domain. This can damage organizational reputation, lead to data breaches, and cause regulatory compliance issues under GDPR if personal data is exposed. Public-facing websites using FoxCMS with vulnerable versions are at risk of defacement or delivering malicious payloads to visitors. The medium CVSS score reflects moderate risk, but the ease of exploitation and lack of vendor patching elevate the urgency. Sectors such as media, education, and government websites using FoxCMS are particularly vulnerable due to their public exposure and reliance on user trust. Additionally, the absence of a patch means organizations must rely on mitigations or consider CMS replacement or upgrades. The impact on availability is minimal, but confidentiality and integrity of user interactions are at risk.
Mitigation Recommendations
Since no official patch or update is available from the vendor, European organizations should implement the following specific mitigations: 1) Apply strict input validation and sanitization on the 'keyword' parameter at the web server or application firewall level to block malicious payloads. 2) Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Deploy Web Application Firewalls (WAFs) with custom rules targeting typical XSS attack patterns on the Search Page endpoint. 4) Educate users and administrators about the risks of clicking untrusted links related to the affected site. 5) If feasible, disable or restrict the Search Page functionality until a patch or secure version is available. 6) Monitor logs for suspicious requests containing script tags or unusual input in the keyword parameter. 7) Consider migrating to a more actively maintained CMS or upgrading to a version that addresses this vulnerability once released. 8) Regularly review and update security policies to include this vulnerability and ensure rapid response to any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-11306: Cross Site Scripting in qianfox FoxCMS
Description
A vulnerability was found in qianfox FoxCMS up to 1.2. This affects an unknown part of the file /index.php/Search of the component Search Page. The manipulation of the argument keyword results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11306 is a cross-site scripting vulnerability identified in qianfox FoxCMS, a content management system, affecting versions 1.0 through 1.2. The flaw resides in the Search Page component, specifically in the handling of the 'keyword' parameter within the /index.php/Search endpoint. Improper sanitization or encoding of this parameter allows an attacker to inject malicious JavaScript code, which is then executed in the context of users visiting the affected page. This vulnerability is remotely exploitable without requiring authentication, but it does require user interaction, such as clicking a crafted link or visiting a malicious page that includes the injected script. The vendor was notified early but has not issued a patch or response, and no known exploits have been observed in the wild yet. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), no impact on confidentiality (VC:N), low impact on integrity (VI:L), no impact on availability (VA:N), and no scope change (S:N). This suggests the primary risk is limited to potential session hijacking, phishing, or defacement through script execution in users’ browsers. The lack of vendor response and absence of patches increases the risk of exploitation once public exploit code becomes widespread. Organizations using FoxCMS should consider this vulnerability critical to their web security posture, especially if the Search Page is publicly accessible and used frequently.
Potential Impact
For European organizations, the impact of this XSS vulnerability can lead to compromised user sessions, theft of sensitive information such as cookies or credentials, and potential phishing attacks leveraging the trusted domain. This can damage organizational reputation, lead to data breaches, and cause regulatory compliance issues under GDPR if personal data is exposed. Public-facing websites using FoxCMS with vulnerable versions are at risk of defacement or delivering malicious payloads to visitors. The medium CVSS score reflects moderate risk, but the ease of exploitation and lack of vendor patching elevate the urgency. Sectors such as media, education, and government websites using FoxCMS are particularly vulnerable due to their public exposure and reliance on user trust. Additionally, the absence of a patch means organizations must rely on mitigations or consider CMS replacement or upgrades. The impact on availability is minimal, but confidentiality and integrity of user interactions are at risk.
Mitigation Recommendations
Since no official patch or update is available from the vendor, European organizations should implement the following specific mitigations: 1) Apply strict input validation and sanitization on the 'keyword' parameter at the web server or application firewall level to block malicious payloads. 2) Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Deploy Web Application Firewalls (WAFs) with custom rules targeting typical XSS attack patterns on the Search Page endpoint. 4) Educate users and administrators about the risks of clicking untrusted links related to the affected site. 5) If feasible, disable or restrict the Search Page functionality until a patch or secure version is available. 6) Monitor logs for suspicious requests containing script tags or unusual input in the keyword parameter. 7) Consider migrating to a more actively maintained CMS or upgrading to a version that addresses this vulnerability once released. 8) Regularly review and update security policies to include this vulnerability and ensure rapid response to any exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-04T18:57:41.746Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e2ed7bb3cc4ef154d59724
Added to database: 10/5/2025, 10:13:15 PM
Last enriched: 10/13/2025, 12:36:56 AM
Last updated: 1/7/2026, 8:50:51 AM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.