CVE-2025-12920: Cross Site Scripting in qianfox FoxCMS
A flaw has been found in qianfox FoxCMS up to 1.2.16. Affected by this vulnerability is the function add/edit of the file app/admin/controller/Product.php. This manipulation of the argument Title causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-12920 is a medium-severity cross-site scripting vulnerability affecting qianfox FoxCMS versions 1.2.0 through 1.2.16. The vulnerability resides in the add/edit functionality within the app/admin/controller/Product.php file, where the Title parameter is improperly sanitized. This flaw allows an attacker to inject malicious JavaScript code remotely by manipulating the Title argument. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:H indicates high privileges required, but the description suggests remote initiation, so this may be a discrepancy), and requires user interaction (UI:P), with no impact on confidentiality or availability and limited impact on integrity. The vendor was notified but did not respond, and no official patches have been released. Exploit code has been published, increasing the risk of exploitation. The vulnerability could be leveraged to execute scripts in the context of the administrator’s browser, potentially leading to session hijacking, defacement, or further attacks within the CMS environment. The lack of vendor response and absence of patches necessitate immediate defensive measures by users.
Potential Impact
For European organizations using FoxCMS, this vulnerability poses a risk primarily to the integrity of their web applications and the security of administrative sessions. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated administrators, leading to session hijacking, unauthorized actions, or distribution of malware to users. While confidentiality and availability impacts are minimal, the integrity compromise could undermine trust in affected websites and lead to reputational damage. Organizations with public-facing admin interfaces or those that allow remote access to the CMS backend are particularly vulnerable. The presence of published exploits increases the likelihood of attacks, especially in sectors relying on FoxCMS for e-commerce or content management. Given the vendor’s lack of response, European entities must proactively address this risk to prevent potential breaches.
Mitigation Recommendations
Since no official patches are available, organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the Title parameter at the web application firewall (WAF) or reverse proxy level to block malicious payloads. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Limit administrative access to trusted IP addresses and enforce multi-factor authentication to reduce the risk of session compromise. Regularly monitor logs for suspicious activities related to product title changes or admin panel access. Consider isolating the CMS backend from public networks or using VPNs for access. If feasible, review and modify the FoxCMS source code to sanitize inputs properly or disable the vulnerable add/edit functionality temporarily. Stay alert for vendor updates or community patches and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12920: Cross Site Scripting in qianfox FoxCMS
Description
A flaw has been found in qianfox FoxCMS up to 1.2.16. Affected by this vulnerability is the function add/edit of the file app/admin/controller/Product.php. This manipulation of the argument Title causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-12920 is a medium-severity cross-site scripting vulnerability affecting qianfox FoxCMS versions 1.2.0 through 1.2.16. The vulnerability resides in the add/edit functionality within the app/admin/controller/Product.php file, where the Title parameter is improperly sanitized. This flaw allows an attacker to inject malicious JavaScript code remotely by manipulating the Title argument. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:H indicates high privileges required, but the description suggests remote initiation, so this may be a discrepancy), and requires user interaction (UI:P), with no impact on confidentiality or availability and limited impact on integrity. The vendor was notified but did not respond, and no official patches have been released. Exploit code has been published, increasing the risk of exploitation. The vulnerability could be leveraged to execute scripts in the context of the administrator’s browser, potentially leading to session hijacking, defacement, or further attacks within the CMS environment. The lack of vendor response and absence of patches necessitate immediate defensive measures by users.
Potential Impact
For European organizations using FoxCMS, this vulnerability poses a risk primarily to the integrity of their web applications and the security of administrative sessions. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated administrators, leading to session hijacking, unauthorized actions, or distribution of malware to users. While confidentiality and availability impacts are minimal, the integrity compromise could undermine trust in affected websites and lead to reputational damage. Organizations with public-facing admin interfaces or those that allow remote access to the CMS backend are particularly vulnerable. The presence of published exploits increases the likelihood of attacks, especially in sectors relying on FoxCMS for e-commerce or content management. Given the vendor’s lack of response, European entities must proactively address this risk to prevent potential breaches.
Mitigation Recommendations
Since no official patches are available, organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the Title parameter at the web application firewall (WAF) or reverse proxy level to block malicious payloads. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Limit administrative access to trusted IP addresses and enforce multi-factor authentication to reduce the risk of session compromise. Regularly monitor logs for suspicious activities related to product title changes or admin panel access. Consider isolating the CMS backend from public networks or using VPNs for access. If feasible, review and modify the FoxCMS source code to sanitize inputs properly or disable the vulnerable add/edit functionality temporarily. Stay alert for vendor updates or community patches and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-09T06:34:06.770Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69112046b991753c98029761
Added to database: 11/9/2025, 11:14:14 PM
Last enriched: 11/16/2025, 11:46:08 PM
Last updated: 12/24/2025, 12:04:21 PM
Views: 100
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-57840: CWE-269 Improper Privilege Management in Honor Magic OS
LowCVE-2025-13407: CWE-434 Unrestricted Upload of File with Dangerous Type in Gravity Forms
UnknownCVE-2024-58335: CWE-611 Improper Restriction of XML External Entity Reference in jcthiele OpenXRechnungToolbox
MediumCVE-2025-66444: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Hitachi Hitachi Infrastructure Analytics Advisor
HighCVE-2025-66445: CWE-306 Missing Authentication for Critical Function in Hitachi Hitachi Infrastructure Analytics Advisor
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.