Skip to main content

CVE-2025-52786: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Kingdom Creation Media Folder

High
VulnerabilityCVE-2025-52786cvecve-2025-52786cwe-79
Published: Wed Jul 16 2025 (07/16/2025, 11:27:55 UTC)
Source: CVE Database V5
Vendor/Project: Kingdom Creation
Product: Media Folder

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kingdom Creation Media Folder allows Reflected XSS. This issue affects Media Folder: from n/a through 1.0.0.

AI-Powered Analysis

AILast updated: 07/16/2025, 12:02:34 UTC

Technical Analysis

CVE-2025-52786 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the Kingdom Creation Media Folder product, affecting versions up to 1.0.0. This vulnerability arises due to improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the application fails to adequately sanitize or encode input parameters before reflecting them in HTTP responses, allowing attackers to inject malicious scripts. When a victim user interacts with a crafted URL or input that triggers this reflected XSS, the malicious script executes in the context of the victim's browser session. This can lead to theft of session cookies, unauthorized actions on behalf of the user, or redirection to malicious sites. The CVSS 3.1 base score of 7.1 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect components beyond the vulnerable module. The impact metrics show low confidentiality, integrity, and availability impacts individually but combined can enable significant session hijacking or user impersonation attacks. No known exploits in the wild have been reported yet, and no patches are currently linked, suggesting that organizations using this product should prioritize mitigation. The vulnerability was published on July 16, 2025, and reserved on June 19, 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, the reflected XSS vulnerability in Kingdom Creation Media Folder poses a significant risk, especially for those relying on this product for media management or content delivery. Exploitation could lead to compromise of user sessions, unauthorized access to sensitive information, and potential lateral movement within internal networks if attackers leverage stolen credentials or session tokens. Given the scope change, the impact could extend beyond the immediate application, affecting integrated systems or services. Organizations in sectors with high regulatory requirements, such as finance, healthcare, and government, may face compliance violations if user data confidentiality or integrity is compromised. Additionally, reputational damage and loss of user trust are likely if customer-facing portals are affected. The requirement for user interaction means phishing or social engineering campaigns could be used to lure victims into triggering the exploit, increasing the risk in environments with less security awareness. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency of addressing the issue.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should implement the following specific measures: 1) Immediately audit all instances of Kingdom Creation Media Folder to identify affected versions and isolate vulnerable deployments. 2) Apply any available vendor patches or updates as soon as they are released; if no patches exist, consider temporary workarounds such as input validation and output encoding at the web application firewall (WAF) level to block malicious payloads. 3) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers, reducing the impact of reflected XSS. 4) Conduct user awareness training focused on recognizing phishing attempts that could deliver malicious URLs exploiting this vulnerability. 5) Review and enhance logging and monitoring to detect unusual web requests or repeated attempts to exploit reflected XSS vectors. 6) If feasible, implement multi-factor authentication (MFA) to reduce the risk of session hijacking consequences. 7) Engage in regular security testing, including automated scanning and manual penetration testing, to identify and remediate similar input validation issues proactively. 8) Collaborate with the vendor for timely updates and share threat intelligence within industry groups to stay informed about emerging exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-19T10:03:15.196Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68779109a83201eaacda58cd

Added to database: 7/16/2025, 11:46:17 AM

Last enriched: 7/16/2025, 12:02:34 PM

Last updated: 8/7/2025, 8:43:51 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats