Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15416: Cross Site Scripting in xnx3 wangmarket

0
Medium
VulnerabilityCVE-2025-15416cvecve-2025-15416
Published: Thu Jan 01 2026 (01/01/2026, 22:32:06 UTC)
Source: CVE Database V5
Vendor/Project: xnx3
Product: wangmarket

Description

A vulnerability was found in xnx3 wangmarket up to 6.4. This affects an unknown function of the file /siteVar/save.do of the component Add Global Variable Handler. The manipulation of the argument Remark/Variable Value results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:58:50 UTC

Technical Analysis

CVE-2025-15416 is a medium-severity cross-site scripting (XSS) vulnerability affecting xnx3 wangmarket versions 6.0 through 6.4. The flaw exists in the /siteVar/save.do endpoint within the Add Global Variable Handler component, where the Remark/Variable Value parameter is not properly sanitized before being reflected in the web application. This allows remote attackers to inject arbitrary JavaScript code that executes in the context of users who interact with the vulnerable functionality. The attack vector is network accessible (AV:N), requires low attack complexity (AC:L), no authentication (AT:N), but user interaction (UI:P) is necessary to trigger the malicious script. The vulnerability impacts the integrity and confidentiality of user sessions by enabling theft of cookies, credentials, or execution of unauthorized actions on behalf of the user. The vendor was notified early but has not issued any patches or advisories, and public exploit code is available, increasing the risk of exploitation. The vulnerability does not affect system availability or require privileges, but the lack of vendor response and public exploits heighten the urgency for organizations to implement mitigations. The CVSS 4.8 score reflects the moderate risk, primarily due to the need for user interaction and limited impact on system integrity and availability.

Potential Impact

The primary impact of CVE-2025-15416 is on the confidentiality and integrity of user data within affected xnx3 wangmarket deployments. Successful exploitation can lead to session hijacking, theft of sensitive information such as credentials or personal data, and unauthorized actions performed on behalf of the victim user. This can result in account compromise, data leakage, and potential further exploitation within the affected environment. While the vulnerability does not directly affect system availability, the indirect consequences such as reputational damage, loss of customer trust, and potential regulatory penalties for data breaches can be significant. Organizations relying on xnx3 wangmarket for e-commerce or web services may face targeted attacks exploiting this vulnerability, especially given the public availability of exploit code and the vendor's lack of response. The requirement for user interaction limits automated exploitation but does not eliminate risk, as social engineering or phishing can be used to trigger the attack. Overall, the vulnerability poses a moderate threat that can escalate if combined with other weaknesses or poor security practices.

Mitigation Recommendations

To mitigate CVE-2025-15416, organizations should first assess their deployment of xnx3 wangmarket and identify if affected versions (6.0 to 6.4) are in use. Given the absence of an official patch, immediate mitigations include implementing web application firewall (WAF) rules to detect and block malicious input targeting the /siteVar/save.do endpoint, especially filtering suspicious Remark/Variable Value parameters. Input validation and output encoding should be enforced at the application level if source code access is available, sanitizing all user-supplied data before rendering. Additionally, organizations should educate users about the risks of interacting with untrusted links or inputs that could trigger XSS attacks. Monitoring web logs for anomalous requests to the vulnerable endpoint can help detect exploitation attempts. Network segmentation and least privilege principles should be applied to limit the impact of compromised accounts. Finally, organizations should engage with the vendor for updates and consider alternative solutions if the vendor remains unresponsive. Regular security assessments and penetration testing focusing on XSS vectors will help identify residual risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T09:52:37.889Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6956f8a3db813ff03e8725ca

Added to database: 1/1/2026, 10:43:47 PM

Last enriched: 2/23/2026, 10:58:50 PM

Last updated: 3/25/2026, 6:09:05 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses