Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15094: Cross Site Scripting in sunkaifei FlyCMS

0
Medium
VulnerabilityCVE-2025-15094cvecve-2025-15094
Published: Fri Dec 26 2025 (12/26/2025, 01:32:06 UTC)
Source: CVE Database V5
Vendor/Project: sunkaifei
Product: FlyCMS

Description

A weakness has been identified in sunkaifei FlyCMS up to abbaa5a8daefb146ad4d61027035026b052cb414. The impacted element is the function userLogin of the file src/main/java/com/flycms/web/front/UserController.java of the component User Login. Executing a manipulation of the argument redirectUrl can lead to cross site scripting. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:30:04 UTC

Technical Analysis

CVE-2025-15094 identifies a cross-site scripting (XSS) vulnerability in FlyCMS, specifically in the userLogin function located in src/main/java/com/flycms/web/front/UserController.java. The vulnerability is triggered by manipulation of the redirectUrl parameter, which is not properly sanitized or validated before being reflected in the application's response. This flaw allows remote attackers to inject arbitrary JavaScript code that executes in the context of the victim's browser when they interact with a crafted URL. The vulnerability requires no authentication and can be exploited remotely, but user interaction is necessary to trigger the malicious script. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity, with attack vector network, low attack complexity, no privileges required, and user interaction needed. The impact primarily affects confidentiality and integrity by enabling session hijacking, credential theft, or phishing attacks. The vendor sunkaifei has been notified but has not responded or issued a patch, and FlyCMS does not use versioning, complicating identification of unaffected versions. The public availability of an exploit increases the risk of exploitation in the wild. This vulnerability highlights the importance of input validation and output encoding in web applications, especially in login workflows where redirect parameters are common.

Potential Impact

The vulnerability allows attackers to execute arbitrary JavaScript in the context of users visiting a maliciously crafted URL, potentially leading to session hijacking, theft of sensitive information such as credentials, or redirection to phishing sites. This can undermine user trust and compromise the security of websites running FlyCMS. Since the flaw exists in the login component, successful exploitation could facilitate unauthorized access or persistent attacks against user accounts. Organizations relying on FlyCMS for content management and user authentication face risks of data breaches, reputational damage, and regulatory consequences if user data is compromised. The lack of vendor response and patch availability increases exposure time, raising the likelihood of exploitation. Although no widespread exploitation is currently reported, the public exploit availability means opportunistic attackers could target vulnerable installations. The impact is primarily on confidentiality and integrity, with limited direct availability impact. Overall, this vulnerability poses a moderate risk to organizations using FlyCMS, especially those with high user interaction or sensitive data.

Mitigation Recommendations

Organizations should immediately implement input validation and output encoding for the redirectUrl parameter to neutralize malicious scripts. If source code modification is possible, sanitize the redirectUrl input by allowing only safe URLs or using a whitelist approach. Employ Content Security Policy (CSP) headers to restrict script execution and reduce XSS impact. Monitor web server logs for suspicious requests containing script payloads targeting redirectUrl. If FlyCMS is deployed behind a web application firewall (WAF), configure rules to detect and block XSS attempts in URL parameters. Educate users to avoid clicking suspicious links and report unusual login page behavior. Since no official patch is available, consider isolating or restricting access to FlyCMS login pages until a fix is released. Regularly check for vendor updates or community patches. Additionally, implement multi-factor authentication (MFA) to mitigate the impact of credential theft resulting from XSS attacks. Finally, conduct security assessments and penetration tests focusing on input validation in FlyCMS installations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-25T12:53:54.953Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694dec4090f5ab8d848ddc74

Added to database: 12/26/2025, 2:00:32 AM

Last enriched: 2/24/2026, 10:30:04 PM

Last updated: 3/25/2026, 4:49:56 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses