CVE-2025-54172: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenSolution Quick.CMS
QuickCMS is vulnerable to Stored XSS in sTitle parameter in page editor functionality. Malicious attacker with admin privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. Regular admin user is not able to inject any JS scripts into the page. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI Analysis
Technical Summary
CVE-2025-54172 is a stored Cross-Site Scripting (XSS) vulnerability identified in OpenSolution's Quick.CMS version 6.8. The vulnerability arises from improper neutralization of input during web page generation, specifically in the 'sTitle' parameter within the page editor functionality. An attacker with administrative privileges can inject arbitrary HTML and JavaScript code into the website content through this parameter. When other users visit the affected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, defacement, or further exploitation. Notably, only users with admin-level privileges can perform this injection; regular admin users without sufficient privileges cannot inject scripts. The vendor was notified early but has not provided detailed information about the vulnerability or the full range of affected versions. Only version 6.8 has been confirmed vulnerable, though other versions may also be at risk. The CVSS 4.0 base score is 4.8 (medium severity), reflecting that the attack vector is network-based, requires high privileges, no authentication bypass, and user interaction is needed for exploitation (victim must visit the malicious page). There are no known exploits in the wild, and no patches have been published yet. This vulnerability falls under CWE-79, which is a common and well-understood class of web application security issues related to improper input sanitization leading to XSS.
Potential Impact
For European organizations using Quick.CMS version 6.8, this vulnerability poses a moderate risk. Since exploitation requires admin-level access, the initial barrier is significant; however, if an attacker gains such privileges (e.g., via credential compromise or insider threat), they can embed malicious scripts that execute in the browsers of site visitors or other admins. This can lead to session hijacking, unauthorized actions performed on behalf of users, data theft, or distribution of malware. The impact on confidentiality and integrity is moderate, while availability is less likely to be affected. European organizations with public-facing websites running Quick.CMS could suffer reputational damage and potential regulatory scrutiny under GDPR if user data is compromised through such attacks. The lack of vendor response and patches increases the risk window. Since the vulnerability requires user interaction (visiting the malicious page), social engineering or phishing campaigns could be used to maximize impact.
Mitigation Recommendations
1. Restrict admin privileges strictly and audit admin accounts regularly to minimize the risk of privilege abuse. 2. Implement strong authentication mechanisms (e.g., MFA) to reduce the chance of admin account compromise. 3. Apply rigorous input validation and output encoding on the 'sTitle' parameter and other user inputs in the CMS, ideally through custom WAF rules or application-layer filters if vendor patches are unavailable. 4. Monitor web application logs for suspicious admin activity or unexpected content changes. 5. Educate administrators about the risks of XSS and the importance of cautious content editing. 6. Consider isolating the CMS environment or limiting access to trusted networks to reduce exposure. 7. Stay alert for vendor updates or community patches addressing this vulnerability and apply them promptly once available. 8. If feasible, perform a security review or penetration test focused on XSS and privilege escalation vectors within the CMS environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-54172: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenSolution Quick.CMS
Description
QuickCMS is vulnerable to Stored XSS in sTitle parameter in page editor functionality. Malicious attacker with admin privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. Regular admin user is not able to inject any JS scripts into the page. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI-Powered Analysis
Technical Analysis
CVE-2025-54172 is a stored Cross-Site Scripting (XSS) vulnerability identified in OpenSolution's Quick.CMS version 6.8. The vulnerability arises from improper neutralization of input during web page generation, specifically in the 'sTitle' parameter within the page editor functionality. An attacker with administrative privileges can inject arbitrary HTML and JavaScript code into the website content through this parameter. When other users visit the affected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, defacement, or further exploitation. Notably, only users with admin-level privileges can perform this injection; regular admin users without sufficient privileges cannot inject scripts. The vendor was notified early but has not provided detailed information about the vulnerability or the full range of affected versions. Only version 6.8 has been confirmed vulnerable, though other versions may also be at risk. The CVSS 4.0 base score is 4.8 (medium severity), reflecting that the attack vector is network-based, requires high privileges, no authentication bypass, and user interaction is needed for exploitation (victim must visit the malicious page). There are no known exploits in the wild, and no patches have been published yet. This vulnerability falls under CWE-79, which is a common and well-understood class of web application security issues related to improper input sanitization leading to XSS.
Potential Impact
For European organizations using Quick.CMS version 6.8, this vulnerability poses a moderate risk. Since exploitation requires admin-level access, the initial barrier is significant; however, if an attacker gains such privileges (e.g., via credential compromise or insider threat), they can embed malicious scripts that execute in the browsers of site visitors or other admins. This can lead to session hijacking, unauthorized actions performed on behalf of users, data theft, or distribution of malware. The impact on confidentiality and integrity is moderate, while availability is less likely to be affected. European organizations with public-facing websites running Quick.CMS could suffer reputational damage and potential regulatory scrutiny under GDPR if user data is compromised through such attacks. The lack of vendor response and patches increases the risk window. Since the vulnerability requires user interaction (visiting the malicious page), social engineering or phishing campaigns could be used to maximize impact.
Mitigation Recommendations
1. Restrict admin privileges strictly and audit admin accounts regularly to minimize the risk of privilege abuse. 2. Implement strong authentication mechanisms (e.g., MFA) to reduce the chance of admin account compromise. 3. Apply rigorous input validation and output encoding on the 'sTitle' parameter and other user inputs in the CMS, ideally through custom WAF rules or application-layer filters if vendor patches are unavailable. 4. Monitor web application logs for suspicious admin activity or unexpected content changes. 5. Educate administrators about the risks of XSS and the importance of cautious content editing. 6. Consider isolating the CMS environment or limiting access to trusted networks to reduce exposure. 7. Stay alert for vendor updates or community patches addressing this vulnerability and apply them promptly once available. 8. If feasible, perform a security review or penetration test focused on XSS and privilege escalation vectors within the CMS environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-07-17T14:14:05.030Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a5c777ad5a09ad0004e15a
Added to database: 8/20/2025, 1:02:47 PM
Last enriched: 8/20/2025, 1:18:48 PM
Last updated: 8/21/2025, 12:35:14 AM
Views: 4
Related Threats
CVE-2025-52351: n/a
UnknownCVE-2025-52352: n/a
UnknownCVE-2025-7051: CWE-284 in N-able N-central
HighCVE-2025-57768: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Alanaktion phproject
MediumCVE-2025-55524: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.