Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14013: Cross Site Scripting in JIZHICMS

0
Medium
VulnerabilityCVE-2025-14013cvecve-2025-14013
Published: Thu Dec 04 2025 (12/04/2025, 18:02:05 UTC)
Source: CVE Database V5
Product: JIZHICMS

Description

A vulnerability was identified in JIZHICMS up to 2.5.5. The impacted element is an unknown function of the file /index.php/admins/Comment/addcomment.html of the component Comment Handler. The manipulation of the argument body leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:48:50 UTC

Technical Analysis

CVE-2025-14013 is a medium-severity cross-site scripting vulnerability affecting JIZHICMS, a content management system, in versions 2.5.0 through 2.5.5. The flaw exists in the Comment Handler component, specifically within the file /index.php/admins/Comment/addcomment.html. The vulnerability is triggered by manipulating the 'body' parameter, which is not properly sanitized or encoded before being rendered in the administrative interface. This allows an attacker to inject arbitrary JavaScript code that executes in the context of an administrator's browser session. The attack vector is remote and does not require authentication, but successful exploitation requires user interaction, such as an admin viewing the malicious comment. The vendor has been contacted but has not provided a patch or response, leaving the vulnerability unmitigated. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the description suggests no authentication is needed, so this may be a discrepancy), user interaction required (UI:P), and limited impact on integrity and confidentiality. No known exploits are currently active in the wild, but public exploit code is available, increasing the risk of exploitation. This vulnerability can lead to session hijacking, defacement, or other malicious actions within the administrative interface, potentially compromising the CMS and its hosted content.

Potential Impact

The primary impact of this XSS vulnerability is on the confidentiality and integrity of administrative sessions within JIZHICMS. An attacker exploiting this flaw can execute arbitrary scripts in the context of an administrator's browser, potentially stealing session cookies, performing unauthorized actions, or defacing the administrative interface. This can lead to further compromise of the CMS, including unauthorized content changes, data leakage, or pivoting to other internal systems. Since the vulnerability is remotely exploitable and requires only user interaction, it poses a moderate risk to organizations using affected versions of JIZHICMS. The lack of vendor response and patches increases the window of exposure. Organizations relying on JIZHICMS for website management, especially those with sensitive or high-traffic sites, face risks of reputational damage, data breaches, and operational disruption if exploited.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement immediate compensating controls. First, restrict access to the administrative interface by IP whitelisting or VPN-only access to reduce exposure. Second, implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the 'body' parameter in the Comment Handler. Third, enforce strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the admin interface. Fourth, educate administrators to be cautious when reviewing comments and to log out when not actively managing the CMS. Additionally, consider deploying input validation and output encoding at the application level if source code access is available, sanitizing the 'body' parameter before rendering. Monitor logs for unusual activity related to comment submissions or admin interface access. Finally, plan to upgrade or migrate to a CMS version or alternative platform once a vendor patch or fix becomes available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-04T11:27:24.658Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6931d6d1e9ea8245265fa5e0

Added to database: 12/4/2025, 6:45:37 PM

Last enriched: 2/24/2026, 10:48:50 PM

Last updated: 3/23/2026, 8:23:01 PM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses