Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15094: Cross Site Scripting in sunkaifei FlyCMS

0
Medium
VulnerabilityCVE-2025-15094cvecve-2025-15094
Published: Fri Dec 26 2025 (12/26/2025, 01:32:06 UTC)
Source: CVE Database V5
Vendor/Project: sunkaifei
Product: FlyCMS

Description

A weakness has been identified in sunkaifei FlyCMS up to abbaa5a8daefb146ad4d61027035026b052cb414. The impacted element is the function userLogin of the file src/main/java/com/flycms/web/front/UserController.java of the component User Login. Executing manipulation of the argument redirectUrl can lead to cross site scripting. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 12/26/2025, 02:15:31 UTC

Technical Analysis

CVE-2025-15094 identifies a cross-site scripting (XSS) vulnerability in FlyCMS, specifically in the userLogin function within the UserController.java file. The vulnerability is triggered by manipulation of the redirectUrl argument, which is not properly sanitized or encoded before being reflected in the web response. This flaw allows remote attackers to inject arbitrary JavaScript code that executes in the context of the victim’s browser when they interact with a crafted URL. The vulnerability does not require authentication or privileges, making it accessible to unauthenticated attackers. The vulnerability is classified as reflected XSS, which typically requires user interaction such as clicking a malicious link. The CVSS 4.0 score is 5.3 (medium severity), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction and having limited impact on confidentiality and integrity. The vendor sunkaifei has been informed but has not responded or released patches, and FlyCMS does not use versioning, complicating identification of affected versions. Public exploit code is available, increasing the risk of exploitation. The vulnerability could be leveraged to steal session cookies, perform phishing attacks, or redirect users to malicious websites, potentially compromising user accounts and organizational security.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to web applications using FlyCMS for content management, especially those exposing login functionality to the internet. Successful exploitation can lead to session hijacking, enabling attackers to impersonate legitimate users, potentially accessing sensitive data or administrative functions. It can also facilitate phishing attacks by redirecting users to malicious sites, undermining user trust and potentially leading to credential theft. The lack of vendor response and absence of patches increases exposure time. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if user data is compromised. Additionally, reputational damage and operational disruption could result from successful attacks. While the vulnerability does not directly impact system availability, the indirect effects on integrity and confidentiality can be significant.

Mitigation Recommendations

European organizations should implement immediate mitigations including input validation and output encoding on the redirectUrl parameter within FlyCMS, ideally by sanitizing inputs to remove or encode potentially malicious characters. Web Application Firewalls (WAFs) should be configured to detect and block suspicious requests containing script payloads in URL parameters. Organizations should monitor web server logs for unusual redirectUrl parameter usage and user reports of suspicious behavior. If possible, disable or restrict the use of redirectUrl parameters in login workflows until a vendor patch is available. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Conduct user awareness training to recognize phishing attempts that may leverage this vulnerability. Finally, consider migrating to alternative CMS platforms with active security maintenance if FlyCMS support remains unresponsive.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-25T12:53:54.953Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694dec4090f5ab8d848ddc74

Added to database: 12/26/2025, 2:00:32 AM

Last enriched: 12/26/2025, 2:15:31 AM

Last updated: 12/26/2025, 4:25:23 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats