CVE-2025-54175: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenSolution Quick.CMS.EXT
QuickCMS.EXT is vulnerable to Reflected XSS in sFileName parameter in thumbnail viewer functionality. An attacker can craft a malicious URL that results in arbitrary JavaScript execution in the victim's browser when opened. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI Analysis
Technical Summary
CVE-2025-54175 is a medium-severity reflected Cross-Site Scripting (XSS) vulnerability identified in OpenSolution's Quick.CMS.EXT version 6.8. The vulnerability arises from improper neutralization of user-supplied input in the 'sFileName' parameter within the thumbnail viewer functionality. Specifically, the application fails to adequately sanitize or encode this parameter before including it in dynamically generated web pages. An attacker can exploit this by crafting a malicious URL containing executable JavaScript code embedded in the 'sFileName' parameter. When a victim opens this URL, the injected script executes in their browser context, potentially allowing the attacker to steal session cookies, perform actions on behalf of the user, or redirect the user to malicious sites. The vendor was notified early but did not provide detailed information about the vulnerability or confirm the full range of affected versions beyond version 6.8, which was tested and confirmed vulnerable. Other versions might also be susceptible but remain untested. The CVSS 4.0 base score is 4.6, reflecting a medium severity level, with attack vector as network (remote), low attack complexity, no privileges required, but user interaction is necessary. The vulnerability does not affect confidentiality, integrity, or availability directly but poses a risk to user session security and trustworthiness of the affected website. No known exploits are currently reported in the wild, and no patches have been published yet.
Potential Impact
For European organizations using Quick.CMS.EXT version 6.8, this vulnerability could lead to targeted phishing or session hijacking attacks against their users or administrators. Since the vulnerability is reflected XSS, it requires the victim to click on a malicious link, which could be distributed via email or social engineering campaigns. Successful exploitation could compromise user accounts, leading to unauthorized access to sensitive information or administrative functions. This is particularly concerning for organizations handling personal data under GDPR, as exploitation could result in data breaches and regulatory penalties. Additionally, compromised websites could be used to distribute malware or conduct further attacks, damaging organizational reputation and trust. The lack of vendor response and patch availability increases the risk window for European entities relying on this CMS for their web presence.
Mitigation Recommendations
Organizations should immediately audit their use of Quick.CMS.EXT, specifically version 6.8, and consider the following mitigations: 1) Implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing malicious scripts in the 'sFileName' parameter. 2) Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and limit the sources of executable scripts. 3) Educate users and administrators about the risks of clicking on untrusted links and implement email filtering to reduce phishing attempts. 4) If feasible, isolate or disable the thumbnail viewer functionality until a patch is available. 5) Monitor web server logs for unusual requests targeting the vulnerable parameter. 6) Engage with the vendor for updates or consider migrating to alternative CMS platforms with better security track records. 7) Apply rigorous input validation and output encoding in any custom integrations or extensions interacting with Quick.CMS.EXT. These steps go beyond generic advice by focusing on immediate compensating controls and user awareness to reduce exploitation likelihood.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-54175: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenSolution Quick.CMS.EXT
Description
QuickCMS.EXT is vulnerable to Reflected XSS in sFileName parameter in thumbnail viewer functionality. An attacker can craft a malicious URL that results in arbitrary JavaScript execution in the victim's browser when opened. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI-Powered Analysis
Technical Analysis
CVE-2025-54175 is a medium-severity reflected Cross-Site Scripting (XSS) vulnerability identified in OpenSolution's Quick.CMS.EXT version 6.8. The vulnerability arises from improper neutralization of user-supplied input in the 'sFileName' parameter within the thumbnail viewer functionality. Specifically, the application fails to adequately sanitize or encode this parameter before including it in dynamically generated web pages. An attacker can exploit this by crafting a malicious URL containing executable JavaScript code embedded in the 'sFileName' parameter. When a victim opens this URL, the injected script executes in their browser context, potentially allowing the attacker to steal session cookies, perform actions on behalf of the user, or redirect the user to malicious sites. The vendor was notified early but did not provide detailed information about the vulnerability or confirm the full range of affected versions beyond version 6.8, which was tested and confirmed vulnerable. Other versions might also be susceptible but remain untested. The CVSS 4.0 base score is 4.6, reflecting a medium severity level, with attack vector as network (remote), low attack complexity, no privileges required, but user interaction is necessary. The vulnerability does not affect confidentiality, integrity, or availability directly but poses a risk to user session security and trustworthiness of the affected website. No known exploits are currently reported in the wild, and no patches have been published yet.
Potential Impact
For European organizations using Quick.CMS.EXT version 6.8, this vulnerability could lead to targeted phishing or session hijacking attacks against their users or administrators. Since the vulnerability is reflected XSS, it requires the victim to click on a malicious link, which could be distributed via email or social engineering campaigns. Successful exploitation could compromise user accounts, leading to unauthorized access to sensitive information or administrative functions. This is particularly concerning for organizations handling personal data under GDPR, as exploitation could result in data breaches and regulatory penalties. Additionally, compromised websites could be used to distribute malware or conduct further attacks, damaging organizational reputation and trust. The lack of vendor response and patch availability increases the risk window for European entities relying on this CMS for their web presence.
Mitigation Recommendations
Organizations should immediately audit their use of Quick.CMS.EXT, specifically version 6.8, and consider the following mitigations: 1) Implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing malicious scripts in the 'sFileName' parameter. 2) Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and limit the sources of executable scripts. 3) Educate users and administrators about the risks of clicking on untrusted links and implement email filtering to reduce phishing attempts. 4) If feasible, isolate or disable the thumbnail viewer functionality until a patch is available. 5) Monitor web server logs for unusual requests targeting the vulnerable parameter. 6) Engage with the vendor for updates or consider migrating to alternative CMS platforms with better security track records. 7) Apply rigorous input validation and output encoding in any custom integrations or extensions interacting with Quick.CMS.EXT. These steps go beyond generic advice by focusing on immediate compensating controls and user awareness to reduce exploitation likelihood.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-07-17T14:14:05.030Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a5c777ad5a09ad0004e162
Added to database: 8/20/2025, 1:02:47 PM
Last enriched: 8/20/2025, 1:18:19 PM
Last updated: 8/20/2025, 3:18:08 PM
Views: 3
Related Threats
CVE-2025-9237: Cross Site Scripting in CodeAstro Ecommerce Website
MediumCVE-2025-9236: SQL Injection in Portabilis i-Diario
MediumCVE-2025-54551: External control of assumed-Immutable web parameter in FUJIFILM Healthcare Americas Corporation Synapse Mobility
MediumCVE-2025-9235: Cross Site Scripting in Scada-LTS
MediumCVE-2025-9234: Cross Site Scripting in Scada-LTS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.