Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15372: Cross Site Scripting in youlaitech vue3-element-admin

0
Medium
VulnerabilityCVE-2025-15372cvecve-2025-15372
Published: Wed Dec 31 2025 (12/31/2025, 02:02:06 UTC)
Source: CVE Database V5
Vendor/Project: youlaitech
Product: vue3-element-admin

Description

CVE-2025-15372 is a medium severity cross-site scripting (XSS) vulnerability found in the youlaitech vue3-element-admin product versions up to 3. 4. 0. The vulnerability resides in the Notice Handler component, specifically in the file src/views/system/notice/index. vue, allowing remote attackers to inject malicious scripts. Exploitation requires no privileges but does need user interaction. The vendor has not responded to disclosure attempts, and no patches are currently available. Although a public exploit exists, no widespread exploitation has been observed. This vulnerability could lead to session hijacking, credential theft, or unauthorized actions within affected applications. European organizations using this admin framework in web applications should prioritize mitigation to prevent potential attacks.

AI-Powered Analysis

AILast updated: 12/31/2025, 02:58:52 UTC

Technical Analysis

CVE-2025-15372 is a cross-site scripting (XSS) vulnerability identified in the youlaitech vue3-element-admin framework, affecting versions 3.0 through 3.4.0. The flaw is located in the Notice Handler component, specifically within the src/views/system/notice/index.vue file. This vulnerability arises from improper handling or sanitization of user-supplied input, which allows attackers to inject malicious JavaScript code that executes in the context of the victim's browser. The attack vector is remote, requiring no authentication but user interaction to trigger the malicious payload. The vulnerability has a CVSS 4.0 base score of 4.8, reflecting medium severity, with the vector indicating network attack vector, low attack complexity, no privileges required, but user interaction needed. The impact primarily affects confidentiality and integrity by enabling session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of the user. The vendor was notified early but has not responded or issued patches, and while a public exploit is available, no known active exploitation campaigns have been reported. This vulnerability is particularly relevant for web applications built on the vue3-element-admin framework, which is a popular Vue.js-based admin dashboard template used in enterprise web applications. The lack of vendor response and patch availability increases the risk for organizations relying on this software, necessitating immediate mitigation efforts.

Potential Impact

For European organizations, the impact of CVE-2025-15372 can be significant if they utilize the vue3-element-admin framework in their web applications or internal dashboards. Successful exploitation can lead to the execution of arbitrary scripts in users' browsers, potentially resulting in session hijacking, credential theft, unauthorized transactions, or the spread of malware within the organization. This can compromise sensitive corporate data and user privacy, leading to regulatory non-compliance under GDPR and reputational damage. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to increase exploitation likelihood. The medium CVSS score indicates moderate risk, but the absence of patches and vendor engagement elevates the urgency. Organizations with public-facing applications using this framework are at higher risk, especially if they have users with elevated privileges. Additionally, the vulnerability could be leveraged as a foothold for further attacks within the network, impacting availability and integrity of critical systems.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on all user inputs processed by the Notice Handler component to prevent injection of malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Conduct thorough code reviews focusing on the affected component to identify and remediate unsafe data handling. Limit user privileges and enforce the principle of least privilege to reduce potential damage from compromised accounts. Educate users about phishing risks and suspicious links to minimize user interaction exploitation. Monitor web application logs and network traffic for unusual activity indicative of exploitation attempts. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting this vulnerability. Finally, maintain close monitoring of vendor communications for any future patches or updates and plan for timely application once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-30T18:39:47.827Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69548debdb813ff03e9760a0

Added to database: 12/31/2025, 2:43:55 AM

Last enriched: 12/31/2025, 2:58:52 AM

Last updated: 12/31/2025, 4:07:38 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats