CVE-2025-61676: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in octobercms october
October is a Content Management System (CMS) and web platform. Prior to versions 3.7.13 and 4.0.12, a cross-site scripting (XSS) vulnerabilities was identified in October CMS backend configuration forms. A user with the Customize Backend Styles permission could inject malicious HTML/JS into the stylesheet input at Styles from Branding & Appearance settings. A specially crafted input could break out of the intended <style> context, allowing arbitrary script execution across backend pages for all users. This issue has been patched in versions 3.7.13 and 4.0.12.
AI Analysis
Technical Summary
CVE-2025-61676 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in October CMS, a popular content management system and web platform. The vulnerability exists in backend configuration forms, specifically in the stylesheet input field under the Branding & Appearance settings. Users who possess the 'Customize Backend Styles' permission can inject malicious HTML or JavaScript code into this input. The issue arises because the input is embedded within a <style> tag context without proper sanitization or neutralization, allowing crafted inputs to break out of the style context and execute arbitrary scripts on backend pages. This can lead to unauthorized script execution affecting all backend users who access these pages. The vulnerability affects October CMS versions from 4.0.0 up to but not including 4.0.12, and versions below 3.7.13. The CVSS v3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network, low attack complexity, requiring high privileges and user interaction, and impacting confidentiality and integrity but not availability. No known exploits are reported in the wild as of the publication date. The issue was patched in versions 3.7.13 and 4.0.12, which properly sanitize or restrict the stylesheet input to prevent script injection.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of backend systems managed via October CMS. If exploited, attackers with backend style customization permissions could execute arbitrary JavaScript, potentially leading to session hijacking, credential theft, or unauthorized actions within the CMS backend. This could compromise sensitive content management workflows, internal administrative controls, and potentially lead to further lateral movement within the network. Organizations with multiple backend users or delegated style customization roles are particularly vulnerable. While availability is not directly impacted, the breach of backend integrity and confidentiality can have significant operational and reputational consequences. Given the medium severity and the requirement for authenticated users with specific permissions, the threat is moderate but should not be underestimated, especially in sectors like government, finance, and media where CMS integrity is critical.
Mitigation Recommendations
1. Immediately upgrade October CMS installations to version 3.7.13 or 4.0.12 or later, where the vulnerability is patched. 2. Restrict the 'Customize Backend Styles' permission to only trusted and essential personnel to minimize the risk of malicious input. 3. Conduct an audit of existing backend style inputs to detect any suspicious or unauthorized scripts. 4. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the backend environment. 5. Monitor backend logs for unusual activity related to style customization or script execution. 6. Educate backend users with style customization permissions about the risks of injecting untrusted content. 7. Consider isolating backend administrative interfaces behind VPNs or IP whitelisting to reduce exposure. 8. Regularly review and update CMS plugins and extensions to ensure compatibility and security.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-61676: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in octobercms october
Description
October is a Content Management System (CMS) and web platform. Prior to versions 3.7.13 and 4.0.12, a cross-site scripting (XSS) vulnerabilities was identified in October CMS backend configuration forms. A user with the Customize Backend Styles permission could inject malicious HTML/JS into the stylesheet input at Styles from Branding & Appearance settings. A specially crafted input could break out of the intended <style> context, allowing arbitrary script execution across backend pages for all users. This issue has been patched in versions 3.7.13 and 4.0.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-61676 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in October CMS, a popular content management system and web platform. The vulnerability exists in backend configuration forms, specifically in the stylesheet input field under the Branding & Appearance settings. Users who possess the 'Customize Backend Styles' permission can inject malicious HTML or JavaScript code into this input. The issue arises because the input is embedded within a <style> tag context without proper sanitization or neutralization, allowing crafted inputs to break out of the style context and execute arbitrary scripts on backend pages. This can lead to unauthorized script execution affecting all backend users who access these pages. The vulnerability affects October CMS versions from 4.0.0 up to but not including 4.0.12, and versions below 3.7.13. The CVSS v3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network, low attack complexity, requiring high privileges and user interaction, and impacting confidentiality and integrity but not availability. No known exploits are reported in the wild as of the publication date. The issue was patched in versions 3.7.13 and 4.0.12, which properly sanitize or restrict the stylesheet input to prevent script injection.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of backend systems managed via October CMS. If exploited, attackers with backend style customization permissions could execute arbitrary JavaScript, potentially leading to session hijacking, credential theft, or unauthorized actions within the CMS backend. This could compromise sensitive content management workflows, internal administrative controls, and potentially lead to further lateral movement within the network. Organizations with multiple backend users or delegated style customization roles are particularly vulnerable. While availability is not directly impacted, the breach of backend integrity and confidentiality can have significant operational and reputational consequences. Given the medium severity and the requirement for authenticated users with specific permissions, the threat is moderate but should not be underestimated, especially in sectors like government, finance, and media where CMS integrity is critical.
Mitigation Recommendations
1. Immediately upgrade October CMS installations to version 3.7.13 or 4.0.12 or later, where the vulnerability is patched. 2. Restrict the 'Customize Backend Styles' permission to only trusted and essential personnel to minimize the risk of malicious input. 3. Conduct an audit of existing backend style inputs to detect any suspicious or unauthorized scripts. 4. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the backend environment. 5. Monitor backend logs for unusual activity related to style customization or script execution. 6. Educate backend users with style customization permissions about the risks of injecting untrusted content. 7. Consider isolating backend administrative interfaces behind VPNs or IP whitelisting to reduce exposure. 8. Regularly review and update CMS plugins and extensions to ensure compatibility and security.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-29T20:25:16.181Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961cb1719784dcf52be20d5
Added to database: 1/10/2026, 3:44:23 AM
Last enriched: 1/10/2026, 3:59:16 AM
Last updated: 1/10/2026, 9:21:56 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.