CVE-2025-11306: Cross Site Scripting in qianfox FoxCMS
A vulnerability was found in qianfox FoxCMS up to 1.2. This affects an unknown part of the file /index.php/Search of the component Search Page. The manipulation of the argument keyword results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11306 is a cross-site scripting vulnerability identified in qianfox FoxCMS, a content management system, affecting versions 1.0 through 1.2. The flaw resides in the Search Page component, specifically in the handling of the 'keyword' parameter within the /index.php/Search endpoint. Improper sanitization or encoding of this parameter allows an attacker to inject malicious JavaScript code, which is then executed in the context of users visiting the affected page. This vulnerability is remotely exploitable without requiring authentication, but it does require user interaction, such as clicking a crafted link or visiting a malicious page that includes the injected script. The vendor was notified early but has not issued a patch or response, and no known exploits have been observed in the wild yet. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), no impact on confidentiality (VC:N), low impact on integrity (VI:L), no impact on availability (VA:N), and no scope change (S:N). This suggests the primary risk is limited to potential session hijacking, phishing, or defacement through script execution in users’ browsers. The lack of vendor response and absence of patches increases the risk of exploitation once public exploit code becomes widespread. Organizations using FoxCMS should consider this vulnerability critical to their web security posture, especially if the Search Page is publicly accessible and used frequently.
Potential Impact
For European organizations, the impact of this XSS vulnerability can lead to compromised user sessions, theft of sensitive information such as cookies or credentials, and potential phishing attacks leveraging the trusted domain. This can damage organizational reputation, lead to data breaches, and cause regulatory compliance issues under GDPR if personal data is exposed. Public-facing websites using FoxCMS with vulnerable versions are at risk of defacement or delivering malicious payloads to visitors. The medium CVSS score reflects moderate risk, but the ease of exploitation and lack of vendor patching elevate the urgency. Sectors such as media, education, and government websites using FoxCMS are particularly vulnerable due to their public exposure and reliance on user trust. Additionally, the absence of a patch means organizations must rely on mitigations or consider CMS replacement or upgrades. The impact on availability is minimal, but confidentiality and integrity of user interactions are at risk.
Mitigation Recommendations
Since no official patch or update is available from the vendor, European organizations should implement the following specific mitigations: 1) Apply strict input validation and sanitization on the 'keyword' parameter at the web server or application firewall level to block malicious payloads. 2) Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Deploy Web Application Firewalls (WAFs) with custom rules targeting typical XSS attack patterns on the Search Page endpoint. 4) Educate users and administrators about the risks of clicking untrusted links related to the affected site. 5) If feasible, disable or restrict the Search Page functionality until a patch or secure version is available. 6) Monitor logs for suspicious requests containing script tags or unusual input in the keyword parameter. 7) Consider migrating to a more actively maintained CMS or upgrading to a version that addresses this vulnerability once released. 8) Regularly review and update security policies to include this vulnerability and ensure rapid response to any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-11306: Cross Site Scripting in qianfox FoxCMS
Description
A vulnerability was found in qianfox FoxCMS up to 1.2. This affects an unknown part of the file /index.php/Search of the component Search Page. The manipulation of the argument keyword results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11306 is a cross-site scripting vulnerability identified in qianfox FoxCMS, a content management system, affecting versions 1.0 through 1.2. The flaw resides in the Search Page component, specifically in the handling of the 'keyword' parameter within the /index.php/Search endpoint. Improper sanitization or encoding of this parameter allows an attacker to inject malicious JavaScript code, which is then executed in the context of users visiting the affected page. This vulnerability is remotely exploitable without requiring authentication, but it does require user interaction, such as clicking a crafted link or visiting a malicious page that includes the injected script. The vendor was notified early but has not issued a patch or response, and no known exploits have been observed in the wild yet. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), no impact on confidentiality (VC:N), low impact on integrity (VI:L), no impact on availability (VA:N), and no scope change (S:N). This suggests the primary risk is limited to potential session hijacking, phishing, or defacement through script execution in users’ browsers. The lack of vendor response and absence of patches increases the risk of exploitation once public exploit code becomes widespread. Organizations using FoxCMS should consider this vulnerability critical to their web security posture, especially if the Search Page is publicly accessible and used frequently.
Potential Impact
For European organizations, the impact of this XSS vulnerability can lead to compromised user sessions, theft of sensitive information such as cookies or credentials, and potential phishing attacks leveraging the trusted domain. This can damage organizational reputation, lead to data breaches, and cause regulatory compliance issues under GDPR if personal data is exposed. Public-facing websites using FoxCMS with vulnerable versions are at risk of defacement or delivering malicious payloads to visitors. The medium CVSS score reflects moderate risk, but the ease of exploitation and lack of vendor patching elevate the urgency. Sectors such as media, education, and government websites using FoxCMS are particularly vulnerable due to their public exposure and reliance on user trust. Additionally, the absence of a patch means organizations must rely on mitigations or consider CMS replacement or upgrades. The impact on availability is minimal, but confidentiality and integrity of user interactions are at risk.
Mitigation Recommendations
Since no official patch or update is available from the vendor, European organizations should implement the following specific mitigations: 1) Apply strict input validation and sanitization on the 'keyword' parameter at the web server or application firewall level to block malicious payloads. 2) Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Deploy Web Application Firewalls (WAFs) with custom rules targeting typical XSS attack patterns on the Search Page endpoint. 4) Educate users and administrators about the risks of clicking untrusted links related to the affected site. 5) If feasible, disable or restrict the Search Page functionality until a patch or secure version is available. 6) Monitor logs for suspicious requests containing script tags or unusual input in the keyword parameter. 7) Consider migrating to a more actively maintained CMS or upgrading to a version that addresses this vulnerability once released. 8) Regularly review and update security policies to include this vulnerability and ensure rapid response to any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-04T18:57:41.746Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e2ed7bb3cc4ef154d59724
Added to database: 10/5/2025, 10:13:15 PM
Last enriched: 10/13/2025, 12:36:56 AM
Last updated: 11/20/2025, 12:51:02 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-40601: CWE-121 Stack-based Buffer Overflow in SonicWall SonicOS
UnknownCVE-2025-40605: CWE-23 Relative Path Traversal in SonicWall Email Security
HighCVE-2025-40604: CWE-494 Download of Code Without Integrity Check in SonicWall Email Security
HighCVE-2025-12414: CWE-290 Authentication Bypass by Spoofing in Google Cloud Looker
CriticalCVE-2025-62346: CWE-352 Cross-Site Request Forgery (CSRF) in HCL Software Glovius Cloud
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.