CVE-2025-14006: Cross Site Scripting in dayrui XunRuiCMS
A security vulnerability has been detected in dayrui XunRuiCMS up to 4.7.1. Affected by this issue is some unknown functionality of the file /admind45f74adbd95.php?c=field&m=add&rname=site&rid=1&page=1 of the component Add Data Validation Page. The manipulation of the argument data[name] leads to cross site scripting. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14006 is a cross-site scripting vulnerability identified in dayrui XunRuiCMS versions 4.7.0 and 4.7.1. The issue resides in the Add Data Validation Page component, specifically within the /admind45f74adbd95.php file, which handles requests with parameters c=field&m=add&rname=site&rid=1&page=1. The vulnerability arises from improper sanitization of the data[name] argument, allowing an attacker to inject malicious JavaScript code. This XSS flaw can be exploited remotely without requiring authentication, though it does require user interaction to trigger the malicious payload. The vulnerability was publicly disclosed on December 4, 2025, and the vendor has not provided any patch or response. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and partial impact on integrity (VI:L), with no impact on confidentiality or availability. While no known exploits are currently active in the wild, the public disclosure and lack of vendor mitigation increase the risk of exploitation. Attackers could leverage this vulnerability to execute arbitrary scripts in the context of the victim’s browser, potentially leading to session hijacking, credential theft, or defacement of web content. The vulnerability affects web applications running XunRuiCMS, a content management system used for website management, which may be deployed in various organizational contexts.
Potential Impact
For European organizations using dayrui XunRuiCMS, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in users’ browsers, leading to session hijacking, theft of sensitive information, or manipulation of website content. This can damage organizational reputation, lead to data breaches, or facilitate further attacks such as phishing campaigns. Since the vulnerability requires user interaction, social engineering or phishing may be used to lure victims into triggering the exploit. The lack of vendor response and patch increases exposure time, potentially allowing attackers to develop and deploy exploits. Organizations relying on XunRuiCMS for public-facing websites or internal portals may face disruption or compromise of user trust. Additionally, regulatory compliance risks arise if personal data is exposed or manipulated, especially under GDPR. The medium severity indicates that while the impact is not critical, the ease of remote exploitation and public disclosure necessitate prompt action to reduce risk.
Mitigation Recommendations
1. Implement strict input validation and output encoding on the data[name] parameter to neutralize malicious scripts. 2. Deploy a Web Application Firewall (WAF) with rules tailored to detect and block XSS payloads targeting the vulnerable endpoint. 3. Restrict access to the /admind45f74adbd95.php endpoint by IP whitelisting or authentication mechanisms to reduce exposure. 4. Monitor web server logs and application behavior for unusual requests or error patterns indicative of exploitation attempts. 5. Educate users and administrators about phishing and social engineering risks to minimize user interaction exploitation. 6. If possible, upgrade to a newer, patched version of XunRuiCMS once available or consider alternative CMS platforms with active security support. 7. Conduct regular security assessments and penetration testing focused on web application vulnerabilities. 8. Apply Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 9. Isolate critical web applications in segmented network zones to contain potential breaches. 10. Maintain backups and incident response plans to quickly recover from any successful attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14006: Cross Site Scripting in dayrui XunRuiCMS
Description
A security vulnerability has been detected in dayrui XunRuiCMS up to 4.7.1. Affected by this issue is some unknown functionality of the file /admind45f74adbd95.php?c=field&m=add&rname=site&rid=1&page=1 of the component Add Data Validation Page. The manipulation of the argument data[name] leads to cross site scripting. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14006 is a cross-site scripting vulnerability identified in dayrui XunRuiCMS versions 4.7.0 and 4.7.1. The issue resides in the Add Data Validation Page component, specifically within the /admind45f74adbd95.php file, which handles requests with parameters c=field&m=add&rname=site&rid=1&page=1. The vulnerability arises from improper sanitization of the data[name] argument, allowing an attacker to inject malicious JavaScript code. This XSS flaw can be exploited remotely without requiring authentication, though it does require user interaction to trigger the malicious payload. The vulnerability was publicly disclosed on December 4, 2025, and the vendor has not provided any patch or response. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and partial impact on integrity (VI:L), with no impact on confidentiality or availability. While no known exploits are currently active in the wild, the public disclosure and lack of vendor mitigation increase the risk of exploitation. Attackers could leverage this vulnerability to execute arbitrary scripts in the context of the victim’s browser, potentially leading to session hijacking, credential theft, or defacement of web content. The vulnerability affects web applications running XunRuiCMS, a content management system used for website management, which may be deployed in various organizational contexts.
Potential Impact
For European organizations using dayrui XunRuiCMS, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary scripts in users’ browsers, leading to session hijacking, theft of sensitive information, or manipulation of website content. This can damage organizational reputation, lead to data breaches, or facilitate further attacks such as phishing campaigns. Since the vulnerability requires user interaction, social engineering or phishing may be used to lure victims into triggering the exploit. The lack of vendor response and patch increases exposure time, potentially allowing attackers to develop and deploy exploits. Organizations relying on XunRuiCMS for public-facing websites or internal portals may face disruption or compromise of user trust. Additionally, regulatory compliance risks arise if personal data is exposed or manipulated, especially under GDPR. The medium severity indicates that while the impact is not critical, the ease of remote exploitation and public disclosure necessitate prompt action to reduce risk.
Mitigation Recommendations
1. Implement strict input validation and output encoding on the data[name] parameter to neutralize malicious scripts. 2. Deploy a Web Application Firewall (WAF) with rules tailored to detect and block XSS payloads targeting the vulnerable endpoint. 3. Restrict access to the /admind45f74adbd95.php endpoint by IP whitelisting or authentication mechanisms to reduce exposure. 4. Monitor web server logs and application behavior for unusual requests or error patterns indicative of exploitation attempts. 5. Educate users and administrators about phishing and social engineering risks to minimize user interaction exploitation. 6. If possible, upgrade to a newer, patched version of XunRuiCMS once available or consider alternative CMS platforms with active security support. 7. Conduct regular security assessments and penetration testing focused on web application vulnerabilities. 8. Apply Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 9. Isolate critical web applications in segmented network zones to contain potential breaches. 10. Maintain backups and incident response plans to quickly recover from any successful attacks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-04T08:11:01.650Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69319e6104d931fa5b36214c
Added to database: 12/4/2025, 2:44:49 PM
Last enriched: 12/11/2025, 10:06:04 PM
Last updated: 1/19/2026, 12:45:05 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1130: SQL Injection in Yonyou KSOA
MediumCVE-2026-1129: SQL Injection in Yonyou KSOA
MediumCVE-2026-23829: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in axllent mailpit
MediumCVE-2025-15539: Denial of Service in Open5GS
MediumCVE-2026-23733: CWE-94: Improper Control of Generation of Code ('Code Injection') in lobehub lobe-chat
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.