Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4379: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Studio Fabryka DobryCMS

0
Medium
VulnerabilityCVE-2025-4379cvecve-2025-4379cwe-79
Published: Fri May 23 2025 (05/23/2025, 10:00:10 UTC)
Source: CVE
Vendor/Project: Studio Fabryka
Product: DobryCMS

Description

DobryCMS in versions 2.* and lower is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in szukaj parameter allows arbitrary JavaScript to be executed on victim's browser when specially crafted URL is opened. A hotfix for affected versions was released on 29.04.2025. It removes the vulnerability without incrementing the version.

AI-Powered Analysis

AILast updated: 07/08/2025, 04:56:45 UTC

Technical Analysis

CVE-2025-4379 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in DobryCMS, a content management system developed by Studio Fabryka. The vulnerability affects versions 2.* and lower of DobryCMS. The root cause is improper neutralization of user input in the 'szukaj' parameter, which is used during web page generation. This flaw allows an attacker to craft a malicious URL containing arbitrary JavaScript code within the 'szukaj' parameter. When a victim opens this specially crafted URL, the injected script executes in the context of the victim's browser session. This can lead to session hijacking, credential theft, or other malicious actions performed on behalf of the user. The vulnerability does not require any authentication or privileges to exploit and can be triggered remotely by simply convincing a user to click a malicious link. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and limited scope impact. A hotfix was released on April 29, 2025, which addresses the vulnerability without incrementing the product version number. No known exploits are reported in the wild as of the publication date. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS attacks.

Potential Impact

For European organizations using DobryCMS, this vulnerability poses a moderate security risk. Successful exploitation could allow attackers to execute arbitrary JavaScript in users' browsers, potentially leading to theft of session cookies, user credentials, or other sensitive information. This can facilitate further attacks such as account takeover or unauthorized actions within the CMS or connected systems. The reflected XSS nature means the attack requires user interaction (clicking a malicious link), which may limit widespread automated exploitation but remains a significant risk through phishing or social engineering campaigns. Organizations handling sensitive data or providing critical services via DobryCMS are at risk of reputational damage, data breaches, and compliance violations under regulations such as GDPR if user data is compromised. The lack of known exploits in the wild suggests the threat is currently low but could increase if exploit code becomes publicly available. The vulnerability's medium severity indicates that while it is not critical, timely remediation is important to prevent potential exploitation.

Mitigation Recommendations

European organizations should immediately apply the hotfix released on April 29, 2025, for DobryCMS versions 2.* and lower to remediate the vulnerability. Since the patch does not increment the version number, administrators must verify patch application through vendor-provided indicators or checksums. Additionally, organizations should implement input validation and output encoding best practices on all user-supplied data, particularly the 'szukaj' parameter, to prevent injection of malicious scripts. Employing a Web Application Firewall (WAF) with rules to detect and block reflected XSS payloads targeting DobryCMS can provide an additional layer of defense. Security awareness training should be conducted to educate users about the risks of clicking suspicious links, reducing the likelihood of successful phishing attempts exploiting this vulnerability. Regular security assessments and code reviews of the CMS and its customizations can help identify and mitigate similar vulnerabilities proactively. Monitoring web server logs for unusual URL patterns involving the 'szukaj' parameter may help detect attempted exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-05-06T10:06:58.896Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68304c460acd01a249271e4e

Added to database: 5/23/2025, 10:21:58 AM

Last enriched: 7/8/2025, 4:56:45 AM

Last updated: 11/22/2025, 10:48:57 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats