Skip to main content

CVE-2025-44108: n/a

Medium
VulnerabilityCVE-2025-44108cvecve-2025-44108
Published: Mon May 19 2025 (05/19/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A stored Cross-Site Scripting (XSS) vulnerability exists in the administration panel of Flatpress CMS before 1.4 via the gallery captions component. An attacker with admin privileges can inject a malicious JavaScript payload into the system, which is then stored persistently.

AI-Powered Analysis

AILast updated: 07/11/2025, 16:49:36 UTC

Technical Analysis

CVE-2025-44108 is a stored Cross-Site Scripting (XSS) vulnerability identified in the administration panel of Flatpress CMS versions prior to 1.4. The vulnerability arises specifically in the gallery captions component, where an attacker with administrative privileges can inject malicious JavaScript code that is persistently stored within the system. When other users or administrators access the affected gallery captions, the malicious script executes in their browsers. This type of vulnerability falls under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 4.8, reflecting a medium severity level. The vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N indicates that the attack can be performed remotely over the network with low attack complexity, but requires high privileges (admin access) and user interaction (such as viewing the malicious content). The vulnerability impacts confidentiality and integrity by allowing script execution that could steal session tokens, manipulate displayed data, or perform actions on behalf of the user. Availability is not affected. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability is significant because it allows persistent script injection in an administrative context, potentially leading to privilege escalation or lateral movement within the CMS environment.

Potential Impact

For European organizations using Flatpress CMS, particularly those managing content with gallery features, this vulnerability poses a risk of unauthorized script execution within their administrative interfaces. Although exploitation requires administrative privileges, a compromised or malicious insider could leverage this vulnerability to execute arbitrary scripts, potentially stealing sensitive information such as authentication tokens or manipulating administrative functions. This could lead to further compromise of the CMS, defacement, or unauthorized data access. Given the persistent nature of the stored XSS, the malicious payload could affect multiple administrators or users who access the gallery captions, amplifying the impact. European organizations in sectors such as media, education, or government that rely on Flatpress CMS for content management may face reputational damage, data confidentiality breaches, and operational disruptions if this vulnerability is exploited. Additionally, the vulnerability's scope includes confidentiality and integrity impacts, which are critical for compliance with European data protection regulations like GDPR.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are using Flatpress CMS versions prior to 1.4 and specifically utilize the gallery captions feature. Immediate steps include restricting administrative access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication to reduce the risk of privilege abuse. Administrators should avoid entering untrusted data into gallery captions and sanitize any input manually if possible. Monitoring and logging administrative actions related to gallery captions can help detect suspicious activity. Since no official patches are currently linked, organizations should closely monitor Flatpress CMS vendor communications for updates or security patches addressing this issue. As a temporary workaround, disabling the gallery captions feature or restricting its usage until a patch is available can reduce exposure. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts in the browser. Regular security training for administrators to recognize and avoid injection of malicious content is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb4f2

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 4:49:36 PM

Last updated: 7/30/2025, 4:07:35 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats