CVE-2025-15452: Cross Site Scripting in xnx3 wangmarket
A weakness has been identified in xnx3 wangmarket up to 4.9. This affects the function variableList of the file /admin/system/variableList.do of the component Backend Variable Search. Executing a manipulation of the argument Description can lead to cross site scripting. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-15452 is a cross-site scripting (XSS) vulnerability identified in the xnx3 wangmarket product, affecting all versions up to 4.9. The vulnerability resides in the Backend Variable Search component, specifically in the variableList function located at /admin/system/variableList.do. The issue arises from improper sanitization or validation of the Description parameter, which an attacker can manipulate to inject malicious JavaScript code. When an authenticated administrator accesses the affected page, the injected script executes in their browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed with the administrator’s privileges. The vulnerability is remotely exploitable without requiring prior authentication, but it does require user interaction—namely, the administrator must visit a crafted URL or page containing the malicious payload. The vendor was notified early but has not issued any patches or advisories, and while an exploit is publicly available, there are no confirmed reports of exploitation in the wild. The CVSS v4.0 score is 4.8 (medium severity), reflecting the moderate impact and the need for user interaction. The vulnerability does not affect confidentiality or availability directly but poses a risk to integrity and administrative control over the system.
Potential Impact
For European organizations using xnx3 wangmarket versions 4.0 to 4.9, this vulnerability presents a risk of administrative account compromise through XSS attacks. Successful exploitation could allow attackers to hijack administrator sessions, manipulate backend configurations, or perform unauthorized actions, potentially leading to data integrity issues or further compromise of internal systems. Since the vulnerability requires user interaction and administrative access, the impact is somewhat limited but still significant in environments where administrative interfaces are accessible remotely or insufficiently protected. The lack of vendor response and patches increases the risk exposure duration. Organizations in sectors with high regulatory requirements for data protection and system integrity, such as finance, healthcare, and government, may face compliance risks if exploited. Additionally, the presence of a public exploit increases the likelihood of opportunistic attacks, especially in environments with weak internal network segmentation or insufficient web application security controls.
Mitigation Recommendations
European organizations should immediately audit their use of xnx3 wangmarket and identify any instances running vulnerable versions (4.0 through 4.9). Since no official patches are available, mitigation should focus on compensating controls: 1) Restrict access to the /admin/system/variableList.do endpoint to trusted IP addresses or VPN-only access to reduce exposure. 2) Implement strict Content Security Policy (CSP) headers to limit the execution of injected scripts. 3) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the Description parameter. 4) Educate administrators to avoid clicking untrusted links or visiting suspicious URLs while logged into the administrative interface. 5) Monitor logs for unusual access patterns or attempts to exploit the Description parameter. 6) Consider deploying runtime application self-protection (RASP) tools to detect and prevent XSS attacks in real-time. 7) Plan for an upgrade or migration to a patched or alternative solution as soon as a vendor fix or community patch becomes available. 8) Isolate administrative interfaces from general user networks and enforce multi-factor authentication to reduce the impact of session hijacking.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-15452: Cross Site Scripting in xnx3 wangmarket
Description
A weakness has been identified in xnx3 wangmarket up to 4.9. This affects the function variableList of the file /admin/system/variableList.do of the component Backend Variable Search. Executing a manipulation of the argument Description can lead to cross site scripting. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-15452 is a cross-site scripting (XSS) vulnerability identified in the xnx3 wangmarket product, affecting all versions up to 4.9. The vulnerability resides in the Backend Variable Search component, specifically in the variableList function located at /admin/system/variableList.do. The issue arises from improper sanitization or validation of the Description parameter, which an attacker can manipulate to inject malicious JavaScript code. When an authenticated administrator accesses the affected page, the injected script executes in their browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed with the administrator’s privileges. The vulnerability is remotely exploitable without requiring prior authentication, but it does require user interaction—namely, the administrator must visit a crafted URL or page containing the malicious payload. The vendor was notified early but has not issued any patches or advisories, and while an exploit is publicly available, there are no confirmed reports of exploitation in the wild. The CVSS v4.0 score is 4.8 (medium severity), reflecting the moderate impact and the need for user interaction. The vulnerability does not affect confidentiality or availability directly but poses a risk to integrity and administrative control over the system.
Potential Impact
For European organizations using xnx3 wangmarket versions 4.0 to 4.9, this vulnerability presents a risk of administrative account compromise through XSS attacks. Successful exploitation could allow attackers to hijack administrator sessions, manipulate backend configurations, or perform unauthorized actions, potentially leading to data integrity issues or further compromise of internal systems. Since the vulnerability requires user interaction and administrative access, the impact is somewhat limited but still significant in environments where administrative interfaces are accessible remotely or insufficiently protected. The lack of vendor response and patches increases the risk exposure duration. Organizations in sectors with high regulatory requirements for data protection and system integrity, such as finance, healthcare, and government, may face compliance risks if exploited. Additionally, the presence of a public exploit increases the likelihood of opportunistic attacks, especially in environments with weak internal network segmentation or insufficient web application security controls.
Mitigation Recommendations
European organizations should immediately audit their use of xnx3 wangmarket and identify any instances running vulnerable versions (4.0 through 4.9). Since no official patches are available, mitigation should focus on compensating controls: 1) Restrict access to the /admin/system/variableList.do endpoint to trusted IP addresses or VPN-only access to reduce exposure. 2) Implement strict Content Security Policy (CSP) headers to limit the execution of injected scripts. 3) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the Description parameter. 4) Educate administrators to avoid clicking untrusted links or visiting suspicious URLs while logged into the administrative interface. 5) Monitor logs for unusual access patterns or attempts to exploit the Description parameter. 6) Consider deploying runtime application self-protection (RASP) tools to detect and prevent XSS attacks in real-time. 7) Plan for an upgrade or migration to a patched or alternative solution as soon as a vendor fix or community patch becomes available. 8) Isolate administrative interfaces from general user networks and enforce multi-factor authentication to reduce the impact of session hijacking.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-04T08:47:45.939Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695b220adb813ff03e08439e
Added to database: 1/5/2026, 2:29:30 AM
Last enriched: 1/5/2026, 2:43:48 AM
Last updated: 1/8/2026, 7:22:44 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.