Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63644: n/a

0
Medium
VulnerabilityCVE-2025-63644cvecve-2025-63644
Published: Wed Jan 14 2026 (01/14/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored cross-site scripting (XSS) vulnerability exists in pH7Software pH7-Social-Dating-CMS 17.9.1 in the user profile Description field.

AI-Powered Analysis

AILast updated: 01/21/2026, 20:39:45 UTC

Technical Analysis

CVE-2025-63644 identifies a stored cross-site scripting (XSS) vulnerability in the pH7Software pH7-Social-Dating-CMS version 17.9.1, specifically within the user profile Description field. Stored XSS occurs when malicious scripts injected by an attacker are permanently stored on the target server and executed in the browsers of users who access the affected content. In this case, an attacker can submit a crafted payload in the Description field of a user profile, which is then rendered without proper sanitization or encoding when other users view the profile. The vulnerability has a CVSS v3.1 base score of 6.1, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the vulnerable component, and impacts confidentiality and integrity partially (C:L/I:L), but not availability (A:N). Exploiting this flaw could allow attackers to steal session cookies, perform actions on behalf of users, or manipulate displayed content, undermining user trust and platform integrity. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The affected CMS is used primarily for social and dating websites, which often handle sensitive personal data and require high trust levels. The CWE-79 classification confirms this is a classic XSS issue due to improper input validation and output encoding. The lack of required privileges and the network vector make this vulnerability relatively easy to exploit, especially in environments with many users interacting with profiles.

Potential Impact

For European organizations operating social or dating platforms using pH7-Social-Dating-CMS, this vulnerability poses a significant risk to user privacy and platform reputation. Exploitation can lead to session hijacking, enabling attackers to impersonate users, access private messages, or manipulate user data. This can result in data breaches, loss of user trust, and potential regulatory penalties under GDPR due to inadequate protection of personal data. The integrity of user-generated content can be compromised, leading to misinformation or malicious content dissemination. Although availability is not impacted, the reputational damage and potential legal consequences can be severe. Since the attack requires user interaction, phishing or social engineering could amplify its impact. The vulnerability could also be leveraged as a foothold for further attacks within the platform or against its users. Organizations relying on this CMS should consider the sensitivity of their user base and the potential for widespread exploitation if left unmitigated.

Mitigation Recommendations

Immediate mitigation should focus on implementing robust input validation and output encoding for the user profile Description field to neutralize malicious scripts. Employ context-aware encoding (e.g., HTML entity encoding) before rendering user input in the browser. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Monitor user-generated content for suspicious inputs and consider temporary disabling or moderating profile descriptions until a patch is available. Regularly update the CMS to the latest version once the vendor releases a security patch addressing this issue. Educate users about the risks of interacting with untrusted profiles and encourage cautious behavior. Implement web application firewalls (WAF) with rules to detect and block common XSS payloads targeting this CMS. Conduct security audits and penetration testing focused on input handling and XSS vulnerabilities. Finally, maintain an incident response plan to quickly address any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6967d6fcd0ff220b9516d49f

Added to database: 1/14/2026, 5:48:44 PM

Last enriched: 1/21/2026, 8:39:45 PM

Last updated: 2/4/2026, 5:43:48 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats