Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15374: Cross Site Scripting in EyouCMS

0
Medium
VulnerabilityCVE-2025-15374cvecve-2025-15374
Published: Wed Dec 31 2025 (12/31/2025, 04:32:08 UTC)
Source: CVE Database V5
Product: EyouCMS

Description

A vulnerability was detected in EyouCMS up to 1.7.7. The affected element is an unknown function of the file application/home/model/Ask.php of the component Ask Module. Performing a manipulation of the argument content results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:46:11 UTC

Technical Analysis

CVE-2025-15374 identifies a cross-site scripting vulnerability in EyouCMS, a content management system, specifically within the Ask module's code located at application/home/model/Ask.php. The vulnerability arises from improper sanitization of the 'content' parameter, which an attacker can manipulate to inject arbitrary JavaScript code. This injection occurs because the application fails to adequately validate or encode user-supplied input before rendering it in the web interface. The vulnerability is remotely exploitable without requiring authentication, but successful exploitation depends on tricking a user into interacting with the malicious payload, such as clicking a crafted link or visiting a compromised page. The CVSS 4.0 base score of 5.1 reflects a medium severity, considering the network attack vector, low attack complexity, no privileges required, but requiring user interaction and limited impact on confidentiality and integrity. The vendor has acknowledged the issue and plans to release version 1.7.8 with a fix. No public exploits have been observed in the wild yet, but the disclosure and availability of technical details increase the risk of exploitation attempts. This vulnerability can be leveraged to execute scripts in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions within the CMS environment.

Potential Impact

The primary impact of CVE-2025-15374 is the compromise of user trust and security through cross-site scripting attacks. Attackers can execute arbitrary scripts in the context of authenticated users, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions on behalf of users. For organizations, this can lead to data breaches, unauthorized access to sensitive information, defacement of websites, and erosion of customer confidence. Since EyouCMS is used to manage web content, exploitation could also facilitate further attacks such as malware distribution or phishing campaigns hosted on compromised sites. The medium severity rating indicates a moderate risk, but the ease of remote exploitation without authentication and the public availability of exploit information elevate the urgency for remediation. Organizations with public-facing EyouCMS installations are particularly at risk, especially if they have high user interaction or rely on the Ask module for user-generated content.

Mitigation Recommendations

1. Upgrade EyouCMS to version 1.7.8 immediately upon its release, as it contains the official patch addressing this vulnerability. 2. Until the patch is available, implement strict input validation and output encoding on the 'content' parameter within the Ask module to neutralize malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Review and sanitize all user-generated content before rendering it on web pages. 5. Monitor web server logs and application logs for suspicious requests targeting the Ask module or containing suspicious payloads. 6. Educate users about the risks of clicking on untrusted links to reduce the likelihood of successful exploitation via social engineering. 7. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block common XSS attack patterns targeting EyouCMS. 8. Conduct regular security assessments and penetration testing focusing on input validation and XSS vulnerabilities in the CMS environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-30T18:46:08.945Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6955a05adb813ff03e045dd4

Added to database: 12/31/2025, 10:14:50 PM

Last enriched: 2/24/2026, 10:46:11 PM

Last updated: 3/25/2026, 3:09:42 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses