Skip to main content

CVE-2025-55175: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenSolution QuickCMS

Medium
VulnerabilityCVE-2025-55175cvecve-2025-55175cwe-79
Published: Thu Aug 28 2025 (08/28/2025, 10:12:44 UTC)
Source: CVE Database V5
Vendor/Project: OpenSolution
Product: QuickCMS

Description

QuickCMS is vulnerable to Reflected XSS via sLangEdit parameter in admin's panel functionality. A malicious attacker can craft a specially crafted URL that, when opened, results in arbitrary JavaScript execution in the victim's browser. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 08/28/2025, 10:32:45 UTC

Technical Analysis

CVE-2025-55175 is a medium-severity reflected Cross-Site Scripting (XSS) vulnerability identified in OpenSolution's QuickCMS version 6.8. The vulnerability arises from improper neutralization of input during web page generation, specifically via the 'sLangEdit' parameter in the administrative panel functionality. An attacker can craft a malicious URL containing a specially crafted payload in this parameter. When an administrator or authorized user opens this URL, arbitrary JavaScript code executes in their browser context. This can lead to session hijacking, unauthorized actions performed with the administrator's privileges, or redirection to malicious sites. The vulnerability does not require authentication or privileges to exploit, but user interaction is necessary (the victim must open the malicious URL). The vendor was notified early but has not provided detailed information or patches, and only version 6.8 has been confirmed vulnerable, though other versions may also be affected. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N) indicates network attack vector, low attack complexity, no privileges or authentication required, user interaction required, and limited scope impact confined to the vulnerable component. No known exploits are currently reported in the wild. This vulnerability is categorized under CWE-79, which involves improper input neutralization leading to XSS attacks.

Potential Impact

For European organizations using QuickCMS 6.8, especially those managing websites or intranet portals with administrative access via web interfaces, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the administrator's browser, potentially leading to theft of session cookies, credential theft, unauthorized administrative actions, or distribution of malware to users. This can compromise confidentiality and integrity of organizational data and disrupt availability if administrative controls are manipulated. Given that the attack requires user interaction but no authentication, phishing or social engineering campaigns could be used to lure administrators into clicking malicious links. The impact is particularly critical for organizations handling sensitive or regulated data, such as financial institutions, healthcare providers, and government entities, where unauthorized access or data leakage can have legal and reputational consequences. Additionally, the lack of vendor response and absence of patches increases the risk exposure until mitigations are applied.

Mitigation Recommendations

European organizations should immediately audit their use of QuickCMS, confirming if version 6.8 is deployed. If so, restrict administrative panel access to trusted IP addresses or VPN-only access to reduce exposure. Implement web application firewalls (WAFs) with rules to detect and block suspicious payloads targeting the 'sLangEdit' parameter. Educate administrators about phishing risks and the dangers of clicking untrusted links. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Monitor web server and application logs for unusual URL requests containing suspicious parameters. If possible, isolate the CMS administrative interface on a separate network segment. Since no official patch is available, consider temporary mitigation by sanitizing or validating input parameters at the web server or proxy level. Engage with the vendor for updates and apply patches promptly once released. Finally, conduct regular security assessments and penetration testing focusing on input validation and XSS vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-08-08T06:21:29.415Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b02cccad5a09ad006bf586

Added to database: 8/28/2025, 10:17:48 AM

Last enriched: 8/28/2025, 10:32:45 AM

Last updated: 8/28/2025, 11:20:24 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats