CVE-2025-14519: Cross Site Scripting in baowzh hfly
A security flaw has been discovered in baowzh hfly up to 638ff9abe9078bc977c132b37acbe1900b63491c. This issue affects some unknown processing of the file /admin/index.php/advtext/add of the component advtext Module. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14519 is a cross-site scripting (XSS) vulnerability identified in the baowzh hfly product, specifically within the advtext module's file /admin/index.php/advtext/add. This vulnerability arises from improper input validation or sanitization of user-supplied data, allowing attackers to inject malicious scripts that execute in the context of an authenticated administrator's browser session. The vulnerability can be exploited remotely without authentication, but requires user interaction, such as an administrator clicking a crafted link or viewing a malicious page. The product uses a rolling release model, which obscures precise versioning, but the affected commit hash is 638ff9abe9078bc977c132b37acbe1900b63491c. The vendor has been notified but has not responded or released a patch. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact on integrity only. The vulnerability does not affect confidentiality or availability directly. Public exploit code has been released, increasing the likelihood of exploitation, although no active exploitation has been reported. This vulnerability could allow attackers to perform actions such as session hijacking, defacement, or delivering malicious payloads to administrators, potentially leading to further compromise of the system or network.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of administrative interfaces running baowzh hfly. Successful exploitation could allow attackers to execute arbitrary scripts in the context of an administrator, potentially leading to session hijacking, unauthorized actions, or the injection of malicious content. While confidentiality and availability impacts are limited, the integrity compromise could facilitate further attacks, including privilege escalation or lateral movement within networks. Organizations relying on baowzh hfly for critical administrative functions may face operational disruptions or reputational damage if attackers leverage this vulnerability. The lack of vendor response and absence of patches increase the window of exposure. Additionally, the public availability of exploit code raises the risk of opportunistic attacks, especially in environments where administrators may be targeted via phishing or social engineering to trigger user interaction. European entities with web-facing administrative portals using this product are particularly at risk.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Applying strict input validation and output encoding on the advtext module inputs, especially at /admin/index.php/advtext/add, to neutralize malicious scripts. 2) Restricting access to the administrative interface via network segmentation, VPNs, or IP whitelisting to limit exposure to trusted users only. 3) Enhancing administrator awareness and training to recognize and avoid phishing or suspicious links that could trigger the XSS exploit. 4) Deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable endpoint. 5) Monitoring logs and network traffic for unusual activity or signs of exploitation attempts. 6) Considering temporary disabling or restricting the advtext module if feasible until a vendor patch is available. 7) Engaging with the vendor or community to track updates or unofficial patches. 8) Implementing Content Security Policy (CSP) headers to reduce the impact of injected scripts. These measures collectively reduce the attack surface and mitigate the risk until an official fix is released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-14519: Cross Site Scripting in baowzh hfly
Description
A security flaw has been discovered in baowzh hfly up to 638ff9abe9078bc977c132b37acbe1900b63491c. This issue affects some unknown processing of the file /admin/index.php/advtext/add of the component advtext Module. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14519 is a cross-site scripting (XSS) vulnerability identified in the baowzh hfly product, specifically within the advtext module's file /admin/index.php/advtext/add. This vulnerability arises from improper input validation or sanitization of user-supplied data, allowing attackers to inject malicious scripts that execute in the context of an authenticated administrator's browser session. The vulnerability can be exploited remotely without authentication, but requires user interaction, such as an administrator clicking a crafted link or viewing a malicious page. The product uses a rolling release model, which obscures precise versioning, but the affected commit hash is 638ff9abe9078bc977c132b37acbe1900b63491c. The vendor has been notified but has not responded or released a patch. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and limited impact on integrity only. The vulnerability does not affect confidentiality or availability directly. Public exploit code has been released, increasing the likelihood of exploitation, although no active exploitation has been reported. This vulnerability could allow attackers to perform actions such as session hijacking, defacement, or delivering malicious payloads to administrators, potentially leading to further compromise of the system or network.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of administrative interfaces running baowzh hfly. Successful exploitation could allow attackers to execute arbitrary scripts in the context of an administrator, potentially leading to session hijacking, unauthorized actions, or the injection of malicious content. While confidentiality and availability impacts are limited, the integrity compromise could facilitate further attacks, including privilege escalation or lateral movement within networks. Organizations relying on baowzh hfly for critical administrative functions may face operational disruptions or reputational damage if attackers leverage this vulnerability. The lack of vendor response and absence of patches increase the window of exposure. Additionally, the public availability of exploit code raises the risk of opportunistic attacks, especially in environments where administrators may be targeted via phishing or social engineering to trigger user interaction. European entities with web-facing administrative portals using this product are particularly at risk.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Applying strict input validation and output encoding on the advtext module inputs, especially at /admin/index.php/advtext/add, to neutralize malicious scripts. 2) Restricting access to the administrative interface via network segmentation, VPNs, or IP whitelisting to limit exposure to trusted users only. 3) Enhancing administrator awareness and training to recognize and avoid phishing or suspicious links that could trigger the XSS exploit. 4) Deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable endpoint. 5) Monitoring logs and network traffic for unusual activity or signs of exploitation attempts. 6) Considering temporary disabling or restricting the advtext module if feasible until a vendor patch is available. 7) Engaging with the vendor or community to track updates or unofficial patches. 8) Implementing Content Security Policy (CSP) headers to reduce the impact of injected scripts. These measures collectively reduce the attack surface and mitigate the risk until an official fix is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-11T07:00:37.928Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693ade897d4c6f31f7b4ab93
Added to database: 12/11/2025, 3:08:57 PM
Last enriched: 12/11/2025, 3:23:54 PM
Last updated: 12/11/2025, 8:28:51 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55816: n/a
UnknownCVE-2025-13148: CWE-620 Unverified Password Change in IBM Aspera Orchestrator
HighCVE-2025-55184: (CWE-502) Deserialization of Untrusted Data. (CWE-400) Uncontrolled Resource Consumption in Meta react-server-dom-webpack
HighCVE-2025-55183: (CWE-502) Deserialization of Untrusted Data. (CWE-497) Exposure of Sensitive System Information to an Unauthorized Actor in Meta react-server-dom-webpack
MediumCVE-2025-14536: SQL Injection in code-projects Class and Exam Timetable Management
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.