Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12920: Cross Site Scripting in qianfox FoxCMS

0
Medium
VulnerabilityCVE-2025-12920cvecve-2025-12920
Published: Sun Nov 09 2025 (11/09/2025, 23:02:05 UTC)
Source: CVE Database V5
Vendor/Project: qianfox
Product: FoxCMS

Description

A flaw has been found in qianfox FoxCMS up to 1.2.16. Affected by this vulnerability is the function add/edit of the file app/admin/controller/Product.php. This manipulation of the argument Title causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/16/2025, 23:46:08 UTC

Technical Analysis

CVE-2025-12920 is a medium-severity cross-site scripting vulnerability affecting qianfox FoxCMS versions 1.2.0 through 1.2.16. The vulnerability resides in the add/edit functionality within the app/admin/controller/Product.php file, where the Title parameter is improperly sanitized. This flaw allows an attacker to inject malicious JavaScript code remotely by manipulating the Title argument. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:H indicates high privileges required, but the description suggests remote initiation, so this may be a discrepancy), and requires user interaction (UI:P), with no impact on confidentiality or availability and limited impact on integrity. The vendor was notified but did not respond, and no official patches have been released. Exploit code has been published, increasing the risk of exploitation. The vulnerability could be leveraged to execute scripts in the context of the administrator’s browser, potentially leading to session hijacking, defacement, or further attacks within the CMS environment. The lack of vendor response and absence of patches necessitate immediate defensive measures by users.

Potential Impact

For European organizations using FoxCMS, this vulnerability poses a risk primarily to the integrity of their web applications and the security of administrative sessions. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated administrators, leading to session hijacking, unauthorized actions, or distribution of malware to users. While confidentiality and availability impacts are minimal, the integrity compromise could undermine trust in affected websites and lead to reputational damage. Organizations with public-facing admin interfaces or those that allow remote access to the CMS backend are particularly vulnerable. The presence of published exploits increases the likelihood of attacks, especially in sectors relying on FoxCMS for e-commerce or content management. Given the vendor’s lack of response, European entities must proactively address this risk to prevent potential breaches.

Mitigation Recommendations

Since no official patches are available, organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the Title parameter at the web application firewall (WAF) or reverse proxy level to block malicious payloads. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Limit administrative access to trusted IP addresses and enforce multi-factor authentication to reduce the risk of session compromise. Regularly monitor logs for suspicious activities related to product title changes or admin panel access. Consider isolating the CMS backend from public networks or using VPNs for access. If feasible, review and modify the FoxCMS source code to sanitize inputs properly or disable the vulnerable add/edit functionality temporarily. Stay alert for vendor updates or community patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-09T06:34:06.770Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69112046b991753c98029761

Added to database: 11/9/2025, 11:14:14 PM

Last enriched: 11/16/2025, 11:46:08 PM

Last updated: 12/24/2025, 12:04:21 PM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats