CVE-2025-12330: Cross Site Scripting in Willow CMS
A security flaw has been discovered in Willow CMS up to 1.4.0. This issue affects some unknown processing of the file /admin/articles/add of the component Add Post Page. The manipulation of the argument title/body results in cross site scripting. The attack may be launched remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-12330 is a cross-site scripting vulnerability identified in Willow CMS versions 1.0 through 1.4.0, specifically within the administrative interface at the /admin/articles/add endpoint. The vulnerability arises from improper handling and sanitization of user-supplied input in the 'title' and 'body' parameters when adding new posts. An attacker with authenticated access to the CMS can craft malicious input containing executable JavaScript code, which is then reflected and executed in the context of an administrator's browser session. This XSS flaw enables attackers to perform actions such as session hijacking, credential theft, or unauthorized administrative commands by exploiting the trust relationship between the administrator and the CMS. The vulnerability is remotely exploitable but requires the attacker to have valid credentials (high privileges) and some user interaction (e.g., tricking an admin to click a crafted link). The CVSS 4.0 score of 4.8 reflects a medium severity, considering the attack vector is network-based with low attack complexity but requiring authentication and user interaction. No known public exploits are currently active in the wild, but the public disclosure increases the risk of exploitation attempts. The vulnerability does not impact system availability or require privilege escalation beyond authenticated access. Willow CMS is a niche content management system, and the affected versions are widely used in some small to medium enterprises for website content management. The lack of official patches at the time of disclosure necessitates immediate mitigation steps to reduce risk.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of administrative sessions within Willow CMS deployments. Successful exploitation could allow attackers to hijack administrator sessions, manipulate website content, or inject malicious scripts that affect site visitors or internal users. This can lead to reputational damage, data leakage, and potential compliance violations under GDPR if personal data is exposed or manipulated. Since the vulnerability requires authenticated access, the threat is heightened in environments with weak credential management or where phishing attacks are prevalent. Organizations relying on Willow CMS for critical web presence or internal portals may face operational disruptions if attackers leverage this vulnerability for further lateral movement or privilege abuse. The medium severity rating suggests moderate risk, but the public availability of exploit details increases urgency. European entities in sectors such as media, education, and small business hosting websites on Willow CMS are particularly vulnerable. The impact is compounded in countries with higher adoption rates of this CMS or where attackers focus on CMS platforms for initial access.
Mitigation Recommendations
1. Immediately restrict access to the /admin/articles/add interface to trusted IP addresses or VPN users to reduce exposure. 2. Implement strict input validation and output encoding on the 'title' and 'body' parameters to neutralize malicious scripts. 3. Enforce multi-factor authentication (MFA) for all administrative accounts to mitigate risks from compromised credentials. 4. Monitor administrative logs for unusual activity or repeated failed login attempts indicating brute force or phishing attempts. 5. Educate administrators about phishing risks and the dangers of clicking on suspicious links that could trigger XSS payloads. 6. If possible, apply any vendor patches or updates as soon as they become available. 7. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the CMS environment. 8. Regularly audit and update CMS plugins or extensions that might interact with the vulnerable component to avoid chained exploits. 9. Consider deploying web application firewalls (WAF) with rules to detect and block XSS attack patterns targeting the affected endpoints.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-12330: Cross Site Scripting in Willow CMS
Description
A security flaw has been discovered in Willow CMS up to 1.4.0. This issue affects some unknown processing of the file /admin/articles/add of the component Add Post Page. The manipulation of the argument title/body results in cross site scripting. The attack may be launched remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-12330 is a cross-site scripting vulnerability identified in Willow CMS versions 1.0 through 1.4.0, specifically within the administrative interface at the /admin/articles/add endpoint. The vulnerability arises from improper handling and sanitization of user-supplied input in the 'title' and 'body' parameters when adding new posts. An attacker with authenticated access to the CMS can craft malicious input containing executable JavaScript code, which is then reflected and executed in the context of an administrator's browser session. This XSS flaw enables attackers to perform actions such as session hijacking, credential theft, or unauthorized administrative commands by exploiting the trust relationship between the administrator and the CMS. The vulnerability is remotely exploitable but requires the attacker to have valid credentials (high privileges) and some user interaction (e.g., tricking an admin to click a crafted link). The CVSS 4.0 score of 4.8 reflects a medium severity, considering the attack vector is network-based with low attack complexity but requiring authentication and user interaction. No known public exploits are currently active in the wild, but the public disclosure increases the risk of exploitation attempts. The vulnerability does not impact system availability or require privilege escalation beyond authenticated access. Willow CMS is a niche content management system, and the affected versions are widely used in some small to medium enterprises for website content management. The lack of official patches at the time of disclosure necessitates immediate mitigation steps to reduce risk.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of administrative sessions within Willow CMS deployments. Successful exploitation could allow attackers to hijack administrator sessions, manipulate website content, or inject malicious scripts that affect site visitors or internal users. This can lead to reputational damage, data leakage, and potential compliance violations under GDPR if personal data is exposed or manipulated. Since the vulnerability requires authenticated access, the threat is heightened in environments with weak credential management or where phishing attacks are prevalent. Organizations relying on Willow CMS for critical web presence or internal portals may face operational disruptions if attackers leverage this vulnerability for further lateral movement or privilege abuse. The medium severity rating suggests moderate risk, but the public availability of exploit details increases urgency. European entities in sectors such as media, education, and small business hosting websites on Willow CMS are particularly vulnerable. The impact is compounded in countries with higher adoption rates of this CMS or where attackers focus on CMS platforms for initial access.
Mitigation Recommendations
1. Immediately restrict access to the /admin/articles/add interface to trusted IP addresses or VPN users to reduce exposure. 2. Implement strict input validation and output encoding on the 'title' and 'body' parameters to neutralize malicious scripts. 3. Enforce multi-factor authentication (MFA) for all administrative accounts to mitigate risks from compromised credentials. 4. Monitor administrative logs for unusual activity or repeated failed login attempts indicating brute force or phishing attempts. 5. Educate administrators about phishing risks and the dangers of clicking on suspicious links that could trigger XSS payloads. 6. If possible, apply any vendor patches or updates as soon as they become available. 7. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the CMS environment. 8. Regularly audit and update CMS plugins or extensions that might interact with the vulnerable component to avoid chained exploits. 9. Consider deploying web application firewalls (WAF) with rules to detect and block XSS attack patterns targeting the affected endpoints.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-27T12:13:07.822Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ffed31ba6dffc5e2122362
Added to database: 10/27/2025, 10:07:45 PM
Last enriched: 11/4/2025, 3:15:59 AM
Last updated: 12/10/2025, 11:14:35 AM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41732: CWE-121 Stack-based Buffer Overflow in WAGO Indsutrial-Managed-Switches
HighCVE-2025-41730: CWE-121 Stack-based Buffer Overflow in WAGO Indsutrial-Managed-Switches
HighCVE-2025-7073: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Bitdefender Total Security
HighCVE-2025-66675: CWE-459 Incomplete Cleanup in Apache Software Foundation Apache Struts
UnknownICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.