CVE-2025-52786: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Kingdom Creation Media Folder
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kingdom Creation Media Folder allows Reflected XSS. This issue affects Media Folder: from n/a through 1.0.0.
AI Analysis
Technical Summary
CVE-2025-52786 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the Kingdom Creation Media Folder product, affecting versions up to 1.0.0. This vulnerability arises due to improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the application fails to adequately sanitize or encode input parameters before reflecting them in HTTP responses, allowing attackers to inject malicious scripts. When a victim user interacts with a crafted URL or input that triggers this reflected XSS, the malicious script executes in the context of the victim's browser session. This can lead to theft of session cookies, unauthorized actions on behalf of the user, or redirection to malicious sites. The CVSS 3.1 base score of 7.1 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect components beyond the vulnerable module. The impact metrics show low confidentiality, integrity, and availability impacts individually but combined can enable significant session hijacking or user impersonation attacks. No known exploits in the wild have been reported yet, and no patches are currently linked, suggesting that organizations using this product should prioritize mitigation. The vulnerability was published on July 16, 2025, and reserved on June 19, 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the reflected XSS vulnerability in Kingdom Creation Media Folder poses a significant risk, especially for those relying on this product for media management or content delivery. Exploitation could lead to compromise of user sessions, unauthorized access to sensitive information, and potential lateral movement within internal networks if attackers leverage stolen credentials or session tokens. Given the scope change, the impact could extend beyond the immediate application, affecting integrated systems or services. Organizations in sectors with high regulatory requirements, such as finance, healthcare, and government, may face compliance violations if user data confidentiality or integrity is compromised. Additionally, reputational damage and loss of user trust are likely if customer-facing portals are affected. The requirement for user interaction means phishing or social engineering campaigns could be used to lure victims into triggering the exploit, increasing the risk in environments with less security awareness. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency of addressing the issue.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should implement the following specific measures: 1) Immediately audit all instances of Kingdom Creation Media Folder to identify affected versions and isolate vulnerable deployments. 2) Apply any available vendor patches or updates as soon as they are released; if no patches exist, consider temporary workarounds such as input validation and output encoding at the web application firewall (WAF) level to block malicious payloads. 3) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers, reducing the impact of reflected XSS. 4) Conduct user awareness training focused on recognizing phishing attempts that could deliver malicious URLs exploiting this vulnerability. 5) Review and enhance logging and monitoring to detect unusual web requests or repeated attempts to exploit reflected XSS vectors. 6) If feasible, implement multi-factor authentication (MFA) to reduce the risk of session hijacking consequences. 7) Engage in regular security testing, including automated scanning and manual penetration testing, to identify and remediate similar input validation issues proactively. 8) Collaborate with the vendor for timely updates and share threat intelligence within industry groups to stay informed about emerging exploits.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-52786: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Kingdom Creation Media Folder
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kingdom Creation Media Folder allows Reflected XSS. This issue affects Media Folder: from n/a through 1.0.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-52786 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the Kingdom Creation Media Folder product, affecting versions up to 1.0.0. This vulnerability arises due to improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the application fails to adequately sanitize or encode input parameters before reflecting them in HTTP responses, allowing attackers to inject malicious scripts. When a victim user interacts with a crafted URL or input that triggers this reflected XSS, the malicious script executes in the context of the victim's browser session. This can lead to theft of session cookies, unauthorized actions on behalf of the user, or redirection to malicious sites. The CVSS 3.1 base score of 7.1 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect components beyond the vulnerable module. The impact metrics show low confidentiality, integrity, and availability impacts individually but combined can enable significant session hijacking or user impersonation attacks. No known exploits in the wild have been reported yet, and no patches are currently linked, suggesting that organizations using this product should prioritize mitigation. The vulnerability was published on July 16, 2025, and reserved on June 19, 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the reflected XSS vulnerability in Kingdom Creation Media Folder poses a significant risk, especially for those relying on this product for media management or content delivery. Exploitation could lead to compromise of user sessions, unauthorized access to sensitive information, and potential lateral movement within internal networks if attackers leverage stolen credentials or session tokens. Given the scope change, the impact could extend beyond the immediate application, affecting integrated systems or services. Organizations in sectors with high regulatory requirements, such as finance, healthcare, and government, may face compliance violations if user data confidentiality or integrity is compromised. Additionally, reputational damage and loss of user trust are likely if customer-facing portals are affected. The requirement for user interaction means phishing or social engineering campaigns could be used to lure victims into triggering the exploit, increasing the risk in environments with less security awareness. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency of addressing the issue.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should implement the following specific measures: 1) Immediately audit all instances of Kingdom Creation Media Folder to identify affected versions and isolate vulnerable deployments. 2) Apply any available vendor patches or updates as soon as they are released; if no patches exist, consider temporary workarounds such as input validation and output encoding at the web application firewall (WAF) level to block malicious payloads. 3) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers, reducing the impact of reflected XSS. 4) Conduct user awareness training focused on recognizing phishing attempts that could deliver malicious URLs exploiting this vulnerability. 5) Review and enhance logging and monitoring to detect unusual web requests or repeated attempts to exploit reflected XSS vectors. 6) If feasible, implement multi-factor authentication (MFA) to reduce the risk of session hijacking consequences. 7) Engage in regular security testing, including automated scanning and manual penetration testing, to identify and remediate similar input validation issues proactively. 8) Collaborate with the vendor for timely updates and share threat intelligence within industry groups to stay informed about emerging exploits.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-19T10:03:15.196Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68779109a83201eaacda58cd
Added to database: 7/16/2025, 11:46:17 AM
Last enriched: 7/16/2025, 12:02:34 PM
Last updated: 8/7/2025, 8:43:51 PM
Views: 12
Related Threats
CVE-2025-9098: Improper Export of Android Application Components in Elseplus File Recovery App
MediumCVE-2025-31715: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
CriticalCVE-2025-31714: CWE-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
MediumCVE-2025-31713: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
HighCVE-2025-9097: Improper Export of Android Application Components in Euro Information CIC banque et compte en ligne App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.