Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12920: Cross Site Scripting in qianfox FoxCMS

0
Medium
VulnerabilityCVE-2025-12920cvecve-2025-12920
Published: Sun Nov 09 2025 (11/09/2025, 23:02:05 UTC)
Source: CVE Database V5
Vendor/Project: qianfox
Product: FoxCMS

Description

A flaw has been found in qianfox FoxCMS up to 1.2.16. Affected by this vulnerability is the function add/edit of the file app/admin/controller/Product.php. This manipulation of the argument Title causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:18:54 UTC

Technical Analysis

CVE-2025-12920 is a cross-site scripting vulnerability identified in the qianfox FoxCMS content management system, affecting all versions up to 1.2.16. The vulnerability resides in the add/edit functionality of the Product.php controller file, where the Title parameter is improperly sanitized. This improper input validation allows an attacker to inject malicious JavaScript code remotely. The attack vector is network-based and does not require prior authentication, although user interaction is necessary to trigger the malicious script once injected. The vulnerability can be exploited by submitting crafted input to the Title field, which is then reflected without proper encoding in the web application’s response, enabling execution of arbitrary scripts in the context of the victim’s browser. The vendor was notified early but has not provided a patch or response, and a public exploit is available, increasing the risk of exploitation. The CVSS 4.0 base score is 4.8, reflecting medium severity, with factors including no required privileges but requiring user interaction and limited impact on confidentiality and integrity. This vulnerability can be leveraged for session hijacking, phishing, or delivering malware to users interacting with the affected FoxCMS sites. The lack of vendor remediation and public exploit availability make this a notable risk for organizations using FoxCMS.

Potential Impact

The primary impact of CVE-2025-12920 is the potential compromise of user sessions and the execution of arbitrary scripts within the browsers of users visiting affected FoxCMS websites. This can lead to theft of sensitive information such as authentication tokens, unauthorized actions performed on behalf of users, defacement of websites, or redirection to malicious sites. For organizations, this undermines the integrity and trustworthiness of their web presence, potentially damaging reputation and leading to regulatory or compliance issues if user data is compromised. Although the vulnerability does not directly affect server availability or confidentiality of backend data, the indirect consequences of successful exploitation can be severe, including loss of customer trust and potential financial losses. The ease of remote exploitation without authentication increases the risk, especially since a public exploit exists. Organizations relying on FoxCMS for e-commerce, customer portals, or public-facing content are particularly vulnerable to targeted attacks or opportunistic exploitation by attackers scanning for vulnerable instances.

Mitigation Recommendations

Given the absence of an official patch from the vendor, organizations should implement immediate mitigations to reduce risk. These include: 1) Applying strict input validation on the Title parameter to reject or sanitize suspicious characters such as script tags or event handlers before processing; 2) Implementing robust output encoding (e.g., HTML entity encoding) on all user-supplied input before rendering it in the browser to prevent script execution; 3) Employing Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS; 4) Monitoring web server and application logs for unusual input patterns or error messages indicative of attempted exploitation; 5) Restricting access to the add/edit product functionality to trusted administrators and enforcing multi-factor authentication to reduce the risk of unauthorized changes; 6) Considering temporary disabling or restricting the vulnerable functionality if feasible until a vendor patch is released; 7) Educating users and administrators about the risks of XSS and encouraging vigilance for suspicious activity. Organizations should also track vendor communications for updates and apply official patches promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-09T06:34:06.770Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69112046b991753c98029761

Added to database: 11/9/2025, 11:14:14 PM

Last enriched: 2/24/2026, 10:18:54 PM

Last updated: 3/25/2026, 4:23:21 AM

Views: 210

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses