Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64046: n/a

0
Medium
VulnerabilityCVE-2025-64046cvecve-2025-64046
Published: Mon Nov 17 2025 (11/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OpenRapid RapidCMS 1.3.1 is vulnerable to Cross Site Scripting (XSS) in /system/update-run.php.

AI-Powered Analysis

AILast updated: 11/17/2025, 16:16:31 UTC

Technical Analysis

CVE-2025-64046 identifies a Cross Site Scripting (XSS) vulnerability in OpenRapid RapidCMS version 1.3.1, located in the /system/update-run.php script. XSS vulnerabilities arise when an application includes untrusted input in web pages without proper validation or encoding, enabling attackers to inject malicious scripts that execute in users' browsers. This particular vulnerability is remotely exploitable over the network without requiring authentication (AV:N/PR:N), but it does require user interaction (UI:R), such as clicking a crafted link or visiting a malicious page. The vulnerability impacts confidentiality and integrity (C:L/I:L) by potentially allowing attackers to steal session cookies, perform actions on behalf of users, or manipulate displayed content. Availability is not affected (A:N). The vulnerability has a CVSS v3.1 base score of 6.1, categorized as medium severity. No patches or known exploits are currently available, which means organizations must proactively implement mitigations. The CWE-79 classification confirms this is a classic reflected or stored XSS issue. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the vulnerable component, possibly impacting the entire web application or user sessions. The lack of affected version details beyond 1.3.1 suggests that this version is confirmed vulnerable, but further version analysis is needed. The vulnerability was reserved on 2025-10-27 and published on 2025-11-17, indicating recent discovery.

Potential Impact

For European organizations, this XSS vulnerability poses risks primarily to web application confidentiality and integrity. Attackers could exploit it to hijack user sessions, steal credentials, or conduct phishing attacks by injecting malicious scripts that alter the user interface or redirect users to malicious sites. This could lead to unauthorized access to sensitive data or manipulation of content, damaging organizational reputation and user trust. While availability is unaffected, the indirect consequences of compromised user accounts or data leakage can be significant. Organizations using OpenRapid RapidCMS 1.3.1, especially in sectors handling sensitive information such as finance, healthcare, or government, are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, as attackers may develop exploits once the vulnerability details become widely known. The vulnerability's requirement for user interaction means social engineering could be leveraged to increase success rates. Given the interconnected nature of European digital infrastructure, exploitation could have cascading effects if attackers leverage compromised accounts for lateral movement or further attacks.

Mitigation Recommendations

1. Implement strict input validation and output encoding on all user-supplied data, especially in the /system/update-run.php endpoint, to neutralize malicious scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the web application context. 3. Conduct thorough code reviews and security testing focusing on XSS vectors in RapidCMS, prioritizing the affected version 1.3.1. 4. Monitor web application logs and user activity for unusual patterns indicative of XSS exploitation attempts. 5. Educate users and administrators about the risks of clicking unknown links or interacting with suspicious content to reduce successful social engineering. 6. If possible, upgrade to a patched or newer version of RapidCMS once available; if no patch exists, consider temporary mitigations such as web application firewalls (WAFs) configured to detect and block XSS payloads targeting the vulnerable endpoint. 7. Isolate the CMS environment to limit potential lateral movement in case of compromise. 8. Engage with the vendor or community to track patch releases and vulnerability disclosures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b46c6bf18c64a4b2b8194

Added to database: 11/17/2025, 4:01:10 PM

Last enriched: 11/17/2025, 4:16:31 PM

Last updated: 11/17/2025, 5:22:35 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats