Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15416: Cross Site Scripting in xnx3 wangmarket

0
Medium
VulnerabilityCVE-2025-15416cvecve-2025-15416
Published: Thu Jan 01 2026 (01/01/2026, 22:32:06 UTC)
Source: CVE Database V5
Vendor/Project: xnx3
Product: wangmarket

Description

A vulnerability was found in xnx3 wangmarket up to 6.4. This affects an unknown function of the file /siteVar/save.do of the component Add Global Variable Handler. The manipulation of the argument Remark/Variable Value results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/09/2026, 10:58:03 UTC

Technical Analysis

CVE-2025-15416 is a cross-site scripting vulnerability identified in the xnx3 wangmarket product, specifically affecting versions 6.0 through 6.4. The vulnerability resides in the /siteVar/save.do endpoint, part of the Add Global Variable Handler component. The issue arises from improper sanitization of user-supplied input in the Remark/Variable Value parameter, allowing attackers to inject malicious JavaScript code. This flaw can be exploited remotely without authentication, although it requires user interaction to trigger the malicious payload, such as a victim clicking a crafted URL or interacting with a compromised page. The vulnerability has a CVSS 4.8 (medium) score, reflecting its moderate impact and ease of exploitation. The vendor was notified early but has not provided any patches or mitigations, and public exploit code is available, increasing the risk of exploitation. The attack vector could lead to session hijacking, theft of sensitive information, or unauthorized actions performed in the context of the victim's session. Since the vulnerability affects a web-based component, it can impact confidentiality and integrity but does not directly affect availability. No known exploits in the wild have been reported yet, but the public availability of exploit code necessitates proactive defense measures.

Potential Impact

For European organizations using xnx3 wangmarket, this vulnerability poses a tangible risk to web application security. Successful exploitation could lead to theft of session cookies, enabling attackers to impersonate legitimate users and access sensitive data or perform unauthorized transactions. This is particularly concerning for e-commerce platforms or services handling personal or financial information. The vulnerability could also be leveraged for defacement or distribution of malware, damaging organizational reputation and customer trust. Given the lack of vendor response and patches, organizations face increased exposure until mitigations are implemented. The impact is heightened in sectors with strict data protection regulations like GDPR, where breaches could result in legal and financial penalties. Additionally, the requirement for user interaction means phishing or social engineering campaigns could be used to facilitate exploitation, increasing the attack surface. Overall, the vulnerability threatens confidentiality and integrity of affected systems and data within European enterprises relying on this software.

Mitigation Recommendations

Since no official patch is available, European organizations should implement immediate compensating controls. First, apply strict input validation and output encoding on the Remark/Variable Value parameter to neutralize malicious scripts. If modifying the application code is not feasible, deploy a web application firewall (WAF) with robust XSS detection and blocking capabilities tailored to the affected endpoint. Conduct regular security audits and penetration tests focusing on this vector to identify and remediate similar issues. Educate users and administrators about phishing risks and suspicious links to reduce the likelihood of user interaction with malicious payloads. Monitor web server logs and application behavior for unusual requests or error patterns indicative of exploitation attempts. Consider isolating or restricting access to the vulnerable component where possible. Finally, maintain close monitoring of vendor communications for any future patches or updates and plan for timely application once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T09:52:37.889Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6956f8a3db813ff03e8725ca

Added to database: 1/1/2026, 10:43:47 PM

Last enriched: 1/9/2026, 10:58:03 AM

Last updated: 2/7/2026, 7:08:06 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats