CVE-2025-12920: Cross Site Scripting in qianfox FoxCMS
A flaw has been found in qianfox FoxCMS up to 1.2.16. Affected by this vulnerability is the function add/edit of the file app/admin/controller/Product.php. This manipulation of the argument Title causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-12920 is a cross-site scripting vulnerability identified in the qianfox FoxCMS content management system, affecting all versions up to 1.2.16. The vulnerability resides in the add/edit functionality of the Product.php controller file, where the Title parameter is improperly sanitized. This improper input validation allows an attacker to inject malicious JavaScript code remotely. The attack vector is network-based and does not require prior authentication, although user interaction is necessary to trigger the malicious script once injected. The vulnerability can be exploited by submitting crafted input to the Title field, which is then reflected without proper encoding in the web application’s response, enabling execution of arbitrary scripts in the context of the victim’s browser. The vendor was notified early but has not provided a patch or response, and a public exploit is available, increasing the risk of exploitation. The CVSS 4.0 base score is 4.8, reflecting medium severity, with factors including no required privileges but requiring user interaction and limited impact on confidentiality and integrity. This vulnerability can be leveraged for session hijacking, phishing, or delivering malware to users interacting with the affected FoxCMS sites. The lack of vendor remediation and public exploit availability make this a notable risk for organizations using FoxCMS.
Potential Impact
The primary impact of CVE-2025-12920 is the potential compromise of user sessions and the execution of arbitrary scripts within the browsers of users visiting affected FoxCMS websites. This can lead to theft of sensitive information such as authentication tokens, unauthorized actions performed on behalf of users, defacement of websites, or redirection to malicious sites. For organizations, this undermines the integrity and trustworthiness of their web presence, potentially damaging reputation and leading to regulatory or compliance issues if user data is compromised. Although the vulnerability does not directly affect server availability or confidentiality of backend data, the indirect consequences of successful exploitation can be severe, including loss of customer trust and potential financial losses. The ease of remote exploitation without authentication increases the risk, especially since a public exploit exists. Organizations relying on FoxCMS for e-commerce, customer portals, or public-facing content are particularly vulnerable to targeted attacks or opportunistic exploitation by attackers scanning for vulnerable instances.
Mitigation Recommendations
Given the absence of an official patch from the vendor, organizations should implement immediate mitigations to reduce risk. These include: 1) Applying strict input validation on the Title parameter to reject or sanitize suspicious characters such as script tags or event handlers before processing; 2) Implementing robust output encoding (e.g., HTML entity encoding) on all user-supplied input before rendering it in the browser to prevent script execution; 3) Employing Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS; 4) Monitoring web server and application logs for unusual input patterns or error messages indicative of attempted exploitation; 5) Restricting access to the add/edit product functionality to trusted administrators and enforcing multi-factor authentication to reduce the risk of unauthorized changes; 6) Considering temporary disabling or restricting the vulnerable functionality if feasible until a vendor patch is released; 7) Educating users and administrators about the risks of XSS and encouraging vigilance for suspicious activity. Organizations should also track vendor communications for updates and apply official patches promptly once available.
Affected Countries
China, United States, India, Germany, Brazil, Russia, United Kingdom, France, Japan, South Korea
CVE-2025-12920: Cross Site Scripting in qianfox FoxCMS
Description
A flaw has been found in qianfox FoxCMS up to 1.2.16. Affected by this vulnerability is the function add/edit of the file app/admin/controller/Product.php. This manipulation of the argument Title causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12920 is a cross-site scripting vulnerability identified in the qianfox FoxCMS content management system, affecting all versions up to 1.2.16. The vulnerability resides in the add/edit functionality of the Product.php controller file, where the Title parameter is improperly sanitized. This improper input validation allows an attacker to inject malicious JavaScript code remotely. The attack vector is network-based and does not require prior authentication, although user interaction is necessary to trigger the malicious script once injected. The vulnerability can be exploited by submitting crafted input to the Title field, which is then reflected without proper encoding in the web application’s response, enabling execution of arbitrary scripts in the context of the victim’s browser. The vendor was notified early but has not provided a patch or response, and a public exploit is available, increasing the risk of exploitation. The CVSS 4.0 base score is 4.8, reflecting medium severity, with factors including no required privileges but requiring user interaction and limited impact on confidentiality and integrity. This vulnerability can be leveraged for session hijacking, phishing, or delivering malware to users interacting with the affected FoxCMS sites. The lack of vendor remediation and public exploit availability make this a notable risk for organizations using FoxCMS.
Potential Impact
The primary impact of CVE-2025-12920 is the potential compromise of user sessions and the execution of arbitrary scripts within the browsers of users visiting affected FoxCMS websites. This can lead to theft of sensitive information such as authentication tokens, unauthorized actions performed on behalf of users, defacement of websites, or redirection to malicious sites. For organizations, this undermines the integrity and trustworthiness of their web presence, potentially damaging reputation and leading to regulatory or compliance issues if user data is compromised. Although the vulnerability does not directly affect server availability or confidentiality of backend data, the indirect consequences of successful exploitation can be severe, including loss of customer trust and potential financial losses. The ease of remote exploitation without authentication increases the risk, especially since a public exploit exists. Organizations relying on FoxCMS for e-commerce, customer portals, or public-facing content are particularly vulnerable to targeted attacks or opportunistic exploitation by attackers scanning for vulnerable instances.
Mitigation Recommendations
Given the absence of an official patch from the vendor, organizations should implement immediate mitigations to reduce risk. These include: 1) Applying strict input validation on the Title parameter to reject or sanitize suspicious characters such as script tags or event handlers before processing; 2) Implementing robust output encoding (e.g., HTML entity encoding) on all user-supplied input before rendering it in the browser to prevent script execution; 3) Employing Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS; 4) Monitoring web server and application logs for unusual input patterns or error messages indicative of attempted exploitation; 5) Restricting access to the add/edit product functionality to trusted administrators and enforcing multi-factor authentication to reduce the risk of unauthorized changes; 6) Considering temporary disabling or restricting the vulnerable functionality if feasible until a vendor patch is released; 7) Educating users and administrators about the risks of XSS and encouraging vigilance for suspicious activity. Organizations should also track vendor communications for updates and apply official patches promptly once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-09T06:34:06.770Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69112046b991753c98029761
Added to database: 11/9/2025, 11:14:14 PM
Last enriched: 2/24/2026, 10:18:54 PM
Last updated: 3/25/2026, 4:23:21 AM
Views: 210
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.