Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14244: Cross Site Scripting in GreenCMS

0
Medium
VulnerabilityCVE-2025-14244cvecve-2025-14244
Published: Mon Dec 08 2025 (12/08/2025, 12:02:05 UTC)
Source: CVE Database V5
Product: GreenCMS

Description

A flaw has been found in GreenCMS 2.3.0603. Affected by this issue is some unknown functionality of the file /Admin/Controller/CustomController.class.php of the component Menu Management Page. This manipulation of the argument Link causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:53:38 UTC

Technical Analysis

CVE-2025-14244 identifies a cross-site scripting vulnerability in GreenCMS version 2.3.0603, specifically within the /Admin/Controller/CustomController.class.php file that handles the Menu Management Page. The vulnerability is caused by insufficient input validation or sanitization of the 'Link' parameter, which can be manipulated by an attacker to inject malicious JavaScript code. This flaw allows remote attackers to execute arbitrary scripts in the context of an authenticated administrator or user with high privileges. The vulnerability does not require authentication bypass but does require the attacker to have high privileges (PR:H) and some user interaction (UI:P), such as tricking an administrator into clicking a crafted link. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). The vulnerability affects only an unsupported version of GreenCMS, and no official patches or updates have been released. While no known exploits are currently active in the wild, proof-of-concept code has been published, increasing the risk of future exploitation. The vulnerability primarily threatens the confidentiality and integrity of administrative sessions and data within the affected CMS installation.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to execute malicious scripts in the context of authenticated users with high privileges, such as administrators. This can lead to session hijacking, credential theft, unauthorized actions within the CMS, or defacement of the website. Since the vulnerability affects an unsupported version of GreenCMS, organizations using it face increased risk due to the absence of official patches or vendor support. The attack requires user interaction and high privileges, limiting the scope somewhat; however, successful exploitation can compromise the integrity and confidentiality of the CMS environment. This can disrupt website management, damage organizational reputation, and potentially expose sensitive data managed through the CMS. The lack of availability impact means the system remains operational, but the trustworthiness of the content and administrative control is undermined.

Mitigation Recommendations

Given the lack of official patches due to the product's unsupported status, organizations should prioritize upgrading to a supported and patched version of GreenCMS or migrating to an alternative CMS platform. If upgrading is not immediately feasible, implement strict input validation and output encoding on the 'Link' parameter within the Menu Management Page to neutralize malicious scripts. Employ web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this specific parameter. Restrict administrative access to trusted networks and enforce multi-factor authentication to reduce the risk of compromised credentials. Conduct regular security awareness training for administrators to recognize and avoid phishing or social engineering attempts that could trigger user interaction-based exploits. Monitor logs for suspicious activities related to the Menu Management Page and the 'Link' parameter. Finally, isolate legacy CMS installations from critical infrastructure and sensitive data to limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-08T05:36:05.756Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6936c3245f72f49d1523dfe0

Added to database: 12/8/2025, 12:23:00 PM

Last enriched: 2/24/2026, 10:53:38 PM

Last updated: 3/25/2026, 1:52:43 AM

Views: 157

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses