Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12330: Cross Site Scripting in Willow CMS

0
Medium
VulnerabilityCVE-2025-12330cvecve-2025-12330
Published: Mon Oct 27 2025 (10/27/2025, 22:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Willow
Product: CMS

Description

A security flaw has been discovered in Willow CMS up to 1.4.0. This issue affects some unknown processing of the file /admin/articles/add of the component Add Post Page. The manipulation of the argument title/body results in cross site scripting. The attack may be launched remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 10/27/2025, 22:23:01 UTC

Technical Analysis

CVE-2025-12330 is a Cross Site Scripting vulnerability identified in Willow CMS versions 1.0 through 1.4.0, specifically within the administrative interface at the /admin/articles/add endpoint. The vulnerability arises due to insufficient sanitization of user-supplied input in the 'title' and 'body' parameters when adding new posts. This allows an attacker with authenticated access to inject malicious JavaScript code that executes in the context of an administrator's browser session. The CVSS 4.0 vector indicates the attack can be launched remotely (AV:N) with low attack complexity (AC:L), but requires privileges (PR:H) and user interaction (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, reflecting the medium severity rating of 4.8. Although no exploits have been observed in the wild, public proof-of-concept code exists, increasing the risk of exploitation. The vulnerability could enable attackers to hijack admin sessions, perform unauthorized actions, or steal sensitive information accessible to the admin user. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

For European organizations using Willow CMS, this vulnerability poses a risk primarily to administrative users who manage website content. Successful exploitation could lead to session hijacking, unauthorized content modification, or the injection of malicious content that affects site visitors. This can damage organizational reputation, lead to data breaches, or facilitate further attacks such as phishing. The requirement for authenticated access limits exposure but insider threats or compromised credentials could be leveraged by attackers. Organizations in sectors with high reliance on CMS platforms for public-facing content, such as media, education, and government, may face higher risks. Additionally, the presence of public exploit code increases the likelihood of opportunistic attacks. The impact on availability is minimal, but integrity and confidentiality of administrative functions are at risk, potentially affecting trust and compliance with data protection regulations like GDPR.

Mitigation Recommendations

Organizations should monitor Willow CMS vendor communications for official patches and apply them promptly once available. Until patches are released, administrators should restrict access to the /admin/articles/add page using network-level controls such as IP whitelisting or VPN access. Implement strict input validation and sanitization on all user inputs, especially in administrative interfaces. Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. Regularly audit user accounts and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Educate administrators about the risks of XSS and the importance of cautious interaction with content inputs. Consider using web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the affected parameters. Finally, monitor logs for unusual activity around the article addition functionality to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T12:13:07.822Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ffed31ba6dffc5e2122362

Added to database: 10/27/2025, 10:07:45 PM

Last enriched: 10/27/2025, 10:23:01 PM

Last updated: 10/28/2025, 4:26:57 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats