Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15451: Cross Site Scripting in xnx3 wangmarket

0
Medium
VulnerabilityCVE-2025-15451cvecve-2025-15451
Published: Mon Jan 05 2026 (01/05/2026, 01:32:09 UTC)
Source: CVE Database V5
Vendor/Project: xnx3
Product: wangmarket

Description

A security flaw has been discovered in xnx3 wangmarket up to 4.9. Affected by this issue is some unknown functionality of the file /admin/system/variableSave.do of the component System Variables Page. Performing a manipulation of the argument Description results in cross site scripting. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/12/2026, 21:25:22 UTC

Technical Analysis

CVE-2025-15451 is a cross-site scripting vulnerability identified in the xnx3 wangmarket e-commerce platform, specifically affecting versions 4.0 through 4.9. The vulnerability resides in the /admin/system/variableSave.do endpoint, part of the System Variables Page, where the Description parameter is improperly sanitized. An attacker can craft malicious input that, when processed by this endpoint, results in the injection and execution of arbitrary JavaScript code in the context of the victim's browser. This flaw can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious script, such as an administrator viewing a manipulated page. The vulnerability impacts the integrity of the application by enabling script injection, which can lead to session hijacking, unauthorized actions, or defacement. The vendor was informed early but has not responded or issued a patch, increasing the risk of exploitation once public proof-of-concept code becomes widespread. The CVSS 4.0 vector indicates low attack complexity and no privileges required, but user interaction is needed, resulting in a medium severity rating with a score of 4.8. No known exploits are currently active in the wild, but the public availability of exploit code raises the risk for organizations running affected versions. The lack of vendor response and patch availability necessitates proactive mitigation by users.

Potential Impact

For European organizations, the impact of this XSS vulnerability can be significant, particularly for those operating e-commerce platforms or administrative portals using xnx3 wangmarket. Successful exploitation could allow attackers to execute malicious scripts in the browsers of administrative users, potentially leading to session hijacking, theft of credentials, unauthorized changes to system variables, or defacement of the web interface. This could undermine trust in the affected services, cause operational disruptions, and lead to data integrity issues. Given that the vulnerability requires user interaction but no authentication, phishing or social engineering could be used to lure administrators into triggering the exploit. The absence of a vendor patch increases exposure time, raising the risk of targeted attacks. Organizations handling sensitive customer data or financial transactions are particularly at risk, as compromised administrative sessions could facilitate further attacks or data breaches. The medium severity rating suggests moderate risk, but the real-world impact depends on the exposure of the vulnerable endpoint and the security posture of the affected organizations.

Mitigation Recommendations

To mitigate CVE-2025-15451, European organizations should implement the following specific measures: 1) Immediately restrict access to the /admin/system/variableSave.do endpoint by IP whitelisting or VPN-only access to limit exposure to trusted administrators. 2) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the Description parameter. 3) Implement strict input validation and output encoding on the Description field to neutralize script injection attempts, even if vendor patches are unavailable. 4) Educate administrative users about phishing risks and the need to avoid clicking suspicious links or opening untrusted content that could trigger the XSS. 5) Monitor logs for unusual activity or repeated requests to the vulnerable endpoint that may indicate exploitation attempts. 6) Consider deploying Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 7) Plan for an upgrade or migration to a patched or alternative platform once the vendor releases a fix or if the product is no longer maintained. These targeted actions go beyond generic advice by focusing on access control, detection, and user awareness tailored to the vulnerability's characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-04T08:47:39.100Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695b220adb813ff03e084398

Added to database: 1/5/2026, 2:29:30 AM

Last enriched: 1/12/2026, 9:25:22 PM

Last updated: 2/5/2026, 2:58:49 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats