Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15093: Cross Site Scripting in sunkaifei FlyCMS

0
Medium
VulnerabilityCVE-2025-15093cvecve-2025-15093
Published: Fri Dec 26 2025 (12/26/2025, 01:02:06 UTC)
Source: CVE Database V5
Vendor/Project: sunkaifei
Product: FlyCMS

Description

A security flaw has been discovered in sunkaifei FlyCMS up to abbaa5a8daefb146ad4d61027035026b052cb414. The affected element is an unknown function of the file src/main/java/com/flycms/web/system/IndexAdminController.java of the component Admin Login. Performing manipulation of the argument redirectUrl results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/26/2025, 01:30:34 UTC

Technical Analysis

CVE-2025-15093 is a cross-site scripting vulnerability identified in the FlyCMS product developed by sunkaifei. The issue resides in the Admin Login component, specifically within an unknown function in the file src/main/java/com/flycms/web/system/IndexAdminController.java. The vulnerability arises from improper handling of the redirectUrl argument, which can be manipulated by an attacker to inject malicious JavaScript code. This flaw allows remote attackers to execute scripts in the context of the victim's browser without requiring authentication, although user interaction is necessary to trigger the payload. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, with characteristics including network attack vector, low attack complexity, no privileges required, and user interaction needed. The vendor uses continuous delivery with rolling releases, making it difficult to identify exact affected versions or available patches. Additionally, the vendor has not responded to disclosure attempts, and no official patch links are available. Public exploit code has been released, increasing the likelihood of exploitation. The vulnerability could be leveraged to perform session hijacking, steal credentials, or conduct unauthorized actions within the administrative interface of FlyCMS, potentially compromising the confidentiality and integrity of affected systems.

Potential Impact

For European organizations using FlyCMS, this vulnerability poses a risk of unauthorized access to administrative functions through session hijacking or credential theft facilitated by XSS attacks. Attackers could manipulate the redirectUrl parameter to inject malicious scripts that execute in the browsers of administrators or privileged users, potentially leading to data breaches or unauthorized system modifications. Given the administrative context, the impact on confidentiality and integrity is significant, although availability impact is limited. The public availability of exploit code increases the risk of opportunistic attacks, especially against organizations that have not implemented adequate input validation or output encoding. The lack of vendor response and unclear patch status complicate remediation efforts, potentially prolonging exposure. Organizations relying on FlyCMS for content management or administrative tasks should consider the threat serious enough to warrant immediate mitigation to prevent compromise.

Mitigation Recommendations

European organizations should implement strict input validation and output encoding for the redirectUrl parameter and any other user-controllable inputs within FlyCMS, particularly in the Admin Login component. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Monitor web server and application logs for unusual redirectUrl parameter values or suspicious activity indicative of XSS attempts. Since no official patches are currently available, consider deploying web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting FlyCMS. Educate administrators and users about the risks of clicking on suspicious links that could trigger XSS attacks. If possible, isolate the FlyCMS administrative interface behind VPNs or IP allowlists to reduce exposure. Regularly review FlyCMS updates for any forthcoming patches and apply them promptly once available. Finally, consider alternative CMS solutions if vendor support remains unresponsive.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-25T12:53:50.746Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694de1be90f5ab8d8485b016

Added to database: 12/26/2025, 1:15:42 AM

Last enriched: 12/26/2025, 1:30:34 AM

Last updated: 12/26/2025, 4:24:05 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats