Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61676: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in octobercms october

0
Medium
VulnerabilityCVE-2025-61676cvecve-2025-61676cwe-79
Published: Sat Jan 10 2026 (01/10/2026, 03:14:00 UTC)
Source: CVE Database V5
Vendor/Project: octobercms
Product: october

Description

October is a Content Management System (CMS) and web platform. Prior to versions 3.7.13 and 4.0.12, a cross-site scripting (XSS) vulnerabilities was identified in October CMS backend configuration forms. A user with the Customize Backend Styles permission could inject malicious HTML/JS into the stylesheet input at Styles from Branding & Appearance settings. A specially crafted input could break out of the intended <style> context, allowing arbitrary script execution across backend pages for all users. This issue has been patched in versions 3.7.13 and 4.0.12.

AI-Powered Analysis

AILast updated: 01/10/2026, 03:59:16 UTC

Technical Analysis

CVE-2025-61676 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in October CMS, a popular content management system and web platform. The vulnerability exists in backend configuration forms, specifically in the stylesheet input field under the Branding & Appearance settings. Users who possess the 'Customize Backend Styles' permission can inject malicious HTML or JavaScript code into this input. The issue arises because the input is embedded within a <style> tag context without proper sanitization or neutralization, allowing crafted inputs to break out of the style context and execute arbitrary scripts on backend pages. This can lead to unauthorized script execution affecting all backend users who access these pages. The vulnerability affects October CMS versions from 4.0.0 up to but not including 4.0.12, and versions below 3.7.13. The CVSS v3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network, low attack complexity, requiring high privileges and user interaction, and impacting confidentiality and integrity but not availability. No known exploits are reported in the wild as of the publication date. The issue was patched in versions 3.7.13 and 4.0.12, which properly sanitize or restrict the stylesheet input to prevent script injection.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of backend systems managed via October CMS. If exploited, attackers with backend style customization permissions could execute arbitrary JavaScript, potentially leading to session hijacking, credential theft, or unauthorized actions within the CMS backend. This could compromise sensitive content management workflows, internal administrative controls, and potentially lead to further lateral movement within the network. Organizations with multiple backend users or delegated style customization roles are particularly vulnerable. While availability is not directly impacted, the breach of backend integrity and confidentiality can have significant operational and reputational consequences. Given the medium severity and the requirement for authenticated users with specific permissions, the threat is moderate but should not be underestimated, especially in sectors like government, finance, and media where CMS integrity is critical.

Mitigation Recommendations

1. Immediately upgrade October CMS installations to version 3.7.13 or 4.0.12 or later, where the vulnerability is patched. 2. Restrict the 'Customize Backend Styles' permission to only trusted and essential personnel to minimize the risk of malicious input. 3. Conduct an audit of existing backend style inputs to detect any suspicious or unauthorized scripts. 4. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the backend environment. 5. Monitor backend logs for unusual activity related to style customization or script execution. 6. Educate backend users with style customization permissions about the risks of injecting untrusted content. 7. Consider isolating backend administrative interfaces behind VPNs or IP whitelisting to reduce exposure. 8. Regularly review and update CMS plugins and extensions to ensure compatibility and security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-09-29T20:25:16.181Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961cb1719784dcf52be20d5

Added to database: 1/10/2026, 3:44:23 AM

Last enriched: 1/10/2026, 3:59:16 AM

Last updated: 1/10/2026, 9:21:56 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats