CVE-2025-14244: Cross Site Scripting in GreenCMS
A flaw has been found in GreenCMS 2.3.0603. Affected by this issue is some unknown functionality of the file /Admin/Controller/CustomController.class.php of the component Menu Management Page. This manipulation of the argument Link causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-14244 identifies a cross-site scripting vulnerability in GreenCMS version 2.3.0603, specifically within the /Admin/Controller/CustomController.class.php file that handles the Menu Management Page. The vulnerability is caused by insufficient input validation or sanitization of the 'Link' parameter, which can be manipulated by an attacker to inject malicious JavaScript code. This flaw allows remote attackers to execute arbitrary scripts in the context of an authenticated administrator or user with high privileges. The vulnerability does not require authentication bypass but does require the attacker to have high privileges (PR:H) and some user interaction (UI:P), such as tricking an administrator into clicking a crafted link. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). The vulnerability affects only an unsupported version of GreenCMS, and no official patches or updates have been released. While no known exploits are currently active in the wild, proof-of-concept code has been published, increasing the risk of future exploitation. The vulnerability primarily threatens the confidentiality and integrity of administrative sessions and data within the affected CMS installation.
Potential Impact
The primary impact of this vulnerability is the potential for attackers to execute malicious scripts in the context of authenticated users with high privileges, such as administrators. This can lead to session hijacking, credential theft, unauthorized actions within the CMS, or defacement of the website. Since the vulnerability affects an unsupported version of GreenCMS, organizations using it face increased risk due to the absence of official patches or vendor support. The attack requires user interaction and high privileges, limiting the scope somewhat; however, successful exploitation can compromise the integrity and confidentiality of the CMS environment. This can disrupt website management, damage organizational reputation, and potentially expose sensitive data managed through the CMS. The lack of availability impact means the system remains operational, but the trustworthiness of the content and administrative control is undermined.
Mitigation Recommendations
Given the lack of official patches due to the product's unsupported status, organizations should prioritize upgrading to a supported and patched version of GreenCMS or migrating to an alternative CMS platform. If upgrading is not immediately feasible, implement strict input validation and output encoding on the 'Link' parameter within the Menu Management Page to neutralize malicious scripts. Employ web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this specific parameter. Restrict administrative access to trusted networks and enforce multi-factor authentication to reduce the risk of compromised credentials. Conduct regular security awareness training for administrators to recognize and avoid phishing or social engineering attempts that could trigger user interaction-based exploits. Monitor logs for suspicious activities related to the Menu Management Page and the 'Link' parameter. Finally, isolate legacy CMS installations from critical infrastructure and sensitive data to limit potential damage.
Affected Countries
China, United States, India, Germany, Brazil, Russia, United Kingdom, France, Japan, South Korea
CVE-2025-14244: Cross Site Scripting in GreenCMS
Description
A flaw has been found in GreenCMS 2.3.0603. Affected by this issue is some unknown functionality of the file /Admin/Controller/CustomController.class.php of the component Menu Management Page. This manipulation of the argument Link causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14244 identifies a cross-site scripting vulnerability in GreenCMS version 2.3.0603, specifically within the /Admin/Controller/CustomController.class.php file that handles the Menu Management Page. The vulnerability is caused by insufficient input validation or sanitization of the 'Link' parameter, which can be manipulated by an attacker to inject malicious JavaScript code. This flaw allows remote attackers to execute arbitrary scripts in the context of an authenticated administrator or user with high privileges. The vulnerability does not require authentication bypass but does require the attacker to have high privileges (PR:H) and some user interaction (UI:P), such as tricking an administrator into clicking a crafted link. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). The vulnerability affects only an unsupported version of GreenCMS, and no official patches or updates have been released. While no known exploits are currently active in the wild, proof-of-concept code has been published, increasing the risk of future exploitation. The vulnerability primarily threatens the confidentiality and integrity of administrative sessions and data within the affected CMS installation.
Potential Impact
The primary impact of this vulnerability is the potential for attackers to execute malicious scripts in the context of authenticated users with high privileges, such as administrators. This can lead to session hijacking, credential theft, unauthorized actions within the CMS, or defacement of the website. Since the vulnerability affects an unsupported version of GreenCMS, organizations using it face increased risk due to the absence of official patches or vendor support. The attack requires user interaction and high privileges, limiting the scope somewhat; however, successful exploitation can compromise the integrity and confidentiality of the CMS environment. This can disrupt website management, damage organizational reputation, and potentially expose sensitive data managed through the CMS. The lack of availability impact means the system remains operational, but the trustworthiness of the content and administrative control is undermined.
Mitigation Recommendations
Given the lack of official patches due to the product's unsupported status, organizations should prioritize upgrading to a supported and patched version of GreenCMS or migrating to an alternative CMS platform. If upgrading is not immediately feasible, implement strict input validation and output encoding on the 'Link' parameter within the Menu Management Page to neutralize malicious scripts. Employ web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this specific parameter. Restrict administrative access to trusted networks and enforce multi-factor authentication to reduce the risk of compromised credentials. Conduct regular security awareness training for administrators to recognize and avoid phishing or social engineering attempts that could trigger user interaction-based exploits. Monitor logs for suspicious activities related to the Menu Management Page and the 'Link' parameter. Finally, isolate legacy CMS installations from critical infrastructure and sensitive data to limit potential damage.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-08T05:36:05.756Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6936c3245f72f49d1523dfe0
Added to database: 12/8/2025, 12:23:00 PM
Last enriched: 2/24/2026, 10:53:38 PM
Last updated: 3/25/2026, 1:52:43 AM
Views: 157
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.