Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15372: Cross Site Scripting in youlaitech vue3-element-admin

0
Medium
VulnerabilityCVE-2025-15372cvecve-2025-15372
Published: Wed Dec 31 2025 (12/31/2025, 02:02:06 UTC)
Source: CVE Database V5
Vendor/Project: youlaitech
Product: vue3-element-admin

Description

A weakness has been identified in youlaitech vue3-element-admin up to 3.4.0. This issue affects some unknown processing of the file src/views/system/notice/index.vue of the component Notice Handler. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/07/2026, 03:27:30 UTC

Technical Analysis

CVE-2025-15372 is a cross-site scripting vulnerability identified in the youlaitech vue3-element-admin product, affecting versions 3.0 through 3.4.0. The vulnerability exists due to improper handling of user-controllable input in the Notice Handler component, specifically within the source file src/views/system/notice/index.vue. This flaw allows remote attackers to inject malicious JavaScript code that executes in the context of the victim's browser when they interact with the affected notice interface. The attack vector is network-based with low attack complexity, requiring no authentication but necessitating user interaction, such as clicking a malicious link or viewing a crafted notice. The vulnerability impacts confidentiality and integrity by enabling theft of session tokens, credentials, or performing unauthorized actions on behalf of the user. The vendor was notified but has not issued a patch or response, and public exploit code is available, increasing the risk of exploitation. The CVSS 4.0 score of 4.8 reflects a medium severity, considering the ease of exploitation and potential impact. No known exploits in the wild have been reported yet, but the availability of exploit code means attackers could leverage this vulnerability soon. The lack of vendor response and patch availability means organizations must implement interim mitigations. The vulnerability is particularly relevant for organizations using vue3-element-admin as part of their web administration interfaces, especially those relying on the affected versions. Given the widespread use of Vue.js frameworks in Europe, this vulnerability could have broad implications if not addressed.

Potential Impact

For European organizations, exploitation of CVE-2025-15372 could lead to unauthorized access to sensitive information, session hijacking, and manipulation of administrative functions within web applications using vue3-element-admin. This could result in data breaches, loss of user trust, and potential regulatory penalties under GDPR if personal data is compromised. The vulnerability could be leveraged to conduct further attacks within the network, such as lateral movement or privilege escalation, especially if the admin panel controls critical infrastructure or sensitive business functions. The medium severity score indicates moderate risk, but the availability of public exploits and lack of vendor patching increase the urgency. Organizations in sectors like finance, healthcare, and government, which often deploy web admin panels for internal management, are particularly at risk. The impact on availability is limited, but the confidentiality and integrity risks are significant enough to warrant immediate attention. Additionally, the vulnerability could be used as a foothold for more complex attacks, amplifying its potential damage.

Mitigation Recommendations

1. Immediately implement strict input validation and sanitization on all user inputs processed by the Notice Handler component, especially in the affected src/views/system/notice/index.vue file. 2. Deploy a robust Content Security Policy (CSP) that restricts the execution of inline scripts and limits sources of executable code to trusted domains. 3. Monitor web application logs and network traffic for unusual or suspicious activity indicative of XSS exploitation attempts. 4. Educate users and administrators about the risks of clicking unknown links or interacting with untrusted notices within the admin interface. 5. If feasible, temporarily disable or restrict access to the Notice Handler functionality until an official patch is released. 6. Keep all dependencies and frameworks up to date, and subscribe to vendor or community advisories for updates on patches. 7. Consider implementing Web Application Firewalls (WAF) with rules designed to detect and block XSS payloads targeting this component. 8. Conduct regular security assessments and penetration testing focusing on web interface vulnerabilities. 9. Prepare incident response plans to quickly address any exploitation attempts. 10. Engage with the vendor or community to encourage timely patch development and disclosure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-30T18:39:47.827Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69548debdb813ff03e9760a0

Added to database: 12/31/2025, 2:43:55 AM

Last enriched: 1/7/2026, 3:27:30 AM

Last updated: 2/7/2026, 11:36:55 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats