Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52367: n/a

0
Medium
VulnerabilityCVE-2025-52367cvecve-2025-52367
Published: Mon Sep 22 2025 (09/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Scripting vulnerability in PivotX CMS v.3.0.0 RC 3 allows a remote attacker to execute arbitrary code via the subtitle field.

AI-Powered Analysis

AILast updated: 09/30/2025, 00:53:02 UTC

Technical Analysis

CVE-2025-52367 is a Cross Site Scripting (XSS) vulnerability identified in PivotX CMS version 3.0.0 RC 3. This vulnerability arises from insufficient sanitization or validation of user input in the subtitle field, allowing a remote attacker to inject malicious scripts. When a victim views the affected subtitle content, the injected script executes in their browser context. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), with the vector indicating that the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), requires privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low, with no impact on availability. No known exploits are currently in the wild, and no patches have been published yet. This vulnerability could be leveraged to execute arbitrary JavaScript code in the context of the affected site, potentially leading to session hijacking, defacement, or redirection to malicious sites. The requirement for privileges and user interaction somewhat limits the ease of exploitation but does not eliminate risk, especially in environments where authenticated users have access to subtitle editing or content management features.

Potential Impact

For European organizations using PivotX CMS 3.0.0 RC 3, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized script execution in the browsers of users who view the compromised subtitle field, potentially exposing session tokens, user credentials, or enabling phishing attacks. This can undermine user trust and lead to data leakage or unauthorized actions performed on behalf of users. Since the vulnerability requires authenticated access with low privileges and user interaction, insider threats or compromised accounts could be leveraged to exploit it. European organizations in sectors such as media, publishing, education, or government that utilize PivotX CMS for content management may face reputational damage and compliance risks under GDPR if personal data is exposed or manipulated. The scope change indicates that the impact could extend beyond the immediate component, possibly affecting other parts of the web application or user sessions.

Mitigation Recommendations

1. Immediately restrict access to subtitle editing features to trusted and verified users only, minimizing the risk of malicious input. 2. Implement strict input validation and output encoding on the subtitle field to neutralize any injected scripts, following OWASP XSS prevention guidelines. 3. Monitor logs for unusual activity related to subtitle field modifications, especially from accounts with low privileges. 4. Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the CMS environment. 5. If possible, disable or limit the use of the subtitle field until a security patch or update is released by the PivotX CMS maintainers. 6. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the CMS. 7. Regularly update and patch the CMS once a fix becomes available and perform thorough security testing on all input fields.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d19a1a93431051bd470171

Added to database: 9/22/2025, 6:48:58 PM

Last enriched: 9/30/2025, 12:53:02 AM

Last updated: 11/3/2025, 1:56:24 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats