Skip to main content

CVE-2025-3961: Cross Site Scripting in withstars Books-Management-System

Medium
VulnerabilityCVE-2025-3961cvecve-2025-3961
Published: Sun Apr 27 2025 (04/27/2025, 06:31:03 UTC)
Source: CVE
Vendor/Project: withstars
Product: Books-Management-System

Description

A vulnerability classified as problematic has been found in withstars Books-Management-System 1.0. This affects an unknown part of the file /admin/article/add/do. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 06/24/2025, 18:32:51 UTC

Technical Analysis

CVE-2025-3961 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the withstars Books-Management-System, specifically within the /admin/article/add/do endpoint. The vulnerability arises from improper sanitization or validation of the 'Title' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript in the context of the victim's browser when they access a crafted URL or submit malicious input. The vulnerability is classified as 'problematic' and has a CVSS 4.0 base score of 5.1, indicating a medium severity level. Notably, the product is no longer supported by the maintainer, meaning no official patches or updates are available to remediate this issue. The vulnerability requires low privileges (PR:L) and user interaction (UI:P), meaning an attacker must trick an authenticated user with limited privileges to interact with the malicious content. The attack vector is network-based (AV:N), and the vulnerability impacts the integrity and availability of the system to a limited extent, with no impact on confidentiality. Other parameters besides 'Title' might also be vulnerable, suggesting a broader input validation problem. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation, especially in environments where the vulnerable system remains deployed without mitigation.

Potential Impact

For European organizations using withstars Books-Management-System version 1.0, this vulnerability poses a risk primarily to administrative users who have access to the /admin/article/add/do functionality. Successful exploitation could lead to session hijacking, defacement of administrative interfaces, or redirection to malicious sites, potentially resulting in unauthorized actions or data manipulation within the system. Since the product is no longer supported, organizations cannot rely on vendor patches, increasing the risk exposure. The impact on confidentiality is limited, but integrity and availability could be compromised if attackers leverage the XSS to perform further attacks such as privilege escalation or injecting malicious payloads. In sectors such as education, publishing, or libraries where this system might be used, disruption or compromise could affect operational continuity and trust. Additionally, because the vulnerability requires user interaction and low privileges, social engineering or phishing campaigns targeting administrative staff could amplify the risk. The lack of active exploitation in the wild currently reduces immediate threat levels, but the public availability of exploit details necessitates proactive measures.

Mitigation Recommendations

Given the absence of official patches due to discontinued support, European organizations should consider the following specific mitigations: 1) Immediately restrict access to the /admin/article/add/do endpoint to trusted IP addresses or VPN-only access to reduce exposure. 2) Implement web application firewall (WAF) rules tailored to detect and block malicious input patterns targeting the 'Title' parameter and other potentially vulnerable inputs. 3) Conduct thorough input validation and sanitization at the application or proxy level, possibly by deploying reverse proxies that can filter or sanitize inputs before reaching the backend. 4) Educate administrative users about the risks of interacting with suspicious links or inputs, emphasizing the need to avoid clicking untrusted URLs. 5) Consider migrating to alternative supported book management systems or upgrading to a maintained version if available. 6) Monitor logs for unusual activity around the vulnerable endpoint, including repeated attempts to inject scripts or anomalous user behavior. 7) If feasible, isolate the vulnerable system within segmented network zones to limit lateral movement in case of compromise. These measures go beyond generic advice by focusing on compensating controls and operational practices tailored to an unsupported product with a known XSS vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-26T07:03:32.057Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef8cc

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 6:32:51 PM

Last updated: 8/16/2025, 6:18:16 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats