CVE-2025-64112: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms
CVE-2025-64112 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in Statamic CMS versions prior to 5. 22. 1. It allows authenticated users with content creation permissions to inject malicious JavaScript into Collections and Taxonomies, which executes when viewed by users with higher privileges. Exploitation requires user interaction and authenticated access but can lead to full compromise of confidentiality, integrity, and availability of affected systems. The vulnerability is fixed in version 5. 22. 1. European organizations using Statamic CMS should prioritize patching to prevent potential privilege escalation and data breaches. No known exploits are currently in the wild, but the ease of exploitation and impact warrant urgent mitigation.
AI Analysis
Technical Summary
CVE-2025-64112 is a stored Cross-Site Scripting (XSS) vulnerability identified in Statamic CMS, a Laravel and Git-powered content management system widely used for managing web content. The vulnerability arises from improper neutralization of input during web page generation, specifically within the Collections and Taxonomies features. Authenticated users who have permissions to create or modify content can inject malicious JavaScript payloads into these components. When higher-privileged users view the compromised content, the injected scripts execute in their browsers, potentially allowing attackers to hijack sessions, steal credentials, perform actions on behalf of the victim, or pivot further into the network. The vulnerability requires the attacker to have at least content creation privileges and the victim to interact with the malicious content, which limits exploitation scope but still poses significant risk. The CVSS v3.1 base score is 8.0, reflecting high severity due to network attack vector, low attack complexity, required privileges, and user interaction. The vulnerability affects all Statamic CMS versions prior to 5.22.1, where the issue has been patched. No public exploits have been reported yet, but the vulnerability's nature and impact make it a critical concern for organizations relying on Statamic for content management.
Potential Impact
For European organizations, this vulnerability can lead to severe consequences including unauthorized access to sensitive information, session hijacking, and potential full compromise of administrative accounts within the CMS environment. This can result in defacement, data leakage, or further lateral movement within corporate networks. Organizations in sectors such as government, finance, media, and e-commerce that rely on Statamic CMS for managing critical web content are particularly at risk. The exploitation could disrupt service availability and damage organizational reputation. Given the requirement for authenticated access, insider threats or compromised low-privilege accounts could be leveraged to escalate privileges and execute attacks. The impact extends beyond the CMS itself, as attackers could use the foothold to target backend systems or steal confidential data. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score indicates urgency.
Mitigation Recommendations
1. Immediately upgrade all Statamic CMS instances to version 5.22.1 or later to apply the official patch addressing this vulnerability. 2. Restrict content creation permissions strictly to trusted users and regularly review user roles to minimize the attack surface. 3. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS payloads by restricting script execution sources. 4. Conduct regular audits of Collections and Taxonomies content for suspicious or unexpected script injections. 5. Employ web application firewalls (WAF) with rules tuned to detect and block XSS payloads targeting Statamic CMS. 6. Monitor logs and user activity for anomalous behavior indicative of exploitation attempts or privilege escalation. 7. Educate content creators and administrators about the risks of XSS and safe content handling practices. 8. Consider implementing multi-factor authentication (MFA) for CMS access to reduce risk from compromised credentials. 9. Isolate the CMS environment from critical backend systems to limit lateral movement in case of compromise.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Denmark
CVE-2025-64112: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms
Description
CVE-2025-64112 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in Statamic CMS versions prior to 5. 22. 1. It allows authenticated users with content creation permissions to inject malicious JavaScript into Collections and Taxonomies, which executes when viewed by users with higher privileges. Exploitation requires user interaction and authenticated access but can lead to full compromise of confidentiality, integrity, and availability of affected systems. The vulnerability is fixed in version 5. 22. 1. European organizations using Statamic CMS should prioritize patching to prevent potential privilege escalation and data breaches. No known exploits are currently in the wild, but the ease of exploitation and impact warrant urgent mitigation.
AI-Powered Analysis
Technical Analysis
CVE-2025-64112 is a stored Cross-Site Scripting (XSS) vulnerability identified in Statamic CMS, a Laravel and Git-powered content management system widely used for managing web content. The vulnerability arises from improper neutralization of input during web page generation, specifically within the Collections and Taxonomies features. Authenticated users who have permissions to create or modify content can inject malicious JavaScript payloads into these components. When higher-privileged users view the compromised content, the injected scripts execute in their browsers, potentially allowing attackers to hijack sessions, steal credentials, perform actions on behalf of the victim, or pivot further into the network. The vulnerability requires the attacker to have at least content creation privileges and the victim to interact with the malicious content, which limits exploitation scope but still poses significant risk. The CVSS v3.1 base score is 8.0, reflecting high severity due to network attack vector, low attack complexity, required privileges, and user interaction. The vulnerability affects all Statamic CMS versions prior to 5.22.1, where the issue has been patched. No public exploits have been reported yet, but the vulnerability's nature and impact make it a critical concern for organizations relying on Statamic for content management.
Potential Impact
For European organizations, this vulnerability can lead to severe consequences including unauthorized access to sensitive information, session hijacking, and potential full compromise of administrative accounts within the CMS environment. This can result in defacement, data leakage, or further lateral movement within corporate networks. Organizations in sectors such as government, finance, media, and e-commerce that rely on Statamic CMS for managing critical web content are particularly at risk. The exploitation could disrupt service availability and damage organizational reputation. Given the requirement for authenticated access, insider threats or compromised low-privilege accounts could be leveraged to escalate privileges and execute attacks. The impact extends beyond the CMS itself, as attackers could use the foothold to target backend systems or steal confidential data. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score indicates urgency.
Mitigation Recommendations
1. Immediately upgrade all Statamic CMS instances to version 5.22.1 or later to apply the official patch addressing this vulnerability. 2. Restrict content creation permissions strictly to trusted users and regularly review user roles to minimize the attack surface. 3. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS payloads by restricting script execution sources. 4. Conduct regular audits of Collections and Taxonomies content for suspicious or unexpected script injections. 5. Employ web application firewalls (WAF) with rules tuned to detect and block XSS payloads targeting Statamic CMS. 6. Monitor logs and user activity for anomalous behavior indicative of exploitation attempts or privilege escalation. 7. Educate content creators and administrators about the risks of XSS and safe content handling practices. 8. Consider implementing multi-factor authentication (MFA) for CMS access to reduce risk from compromised credentials. 9. Isolate the CMS environment from critical backend systems to limit lateral movement in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-27T15:26:14.127Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6903a6a4aebfcd54748ac668
Added to database: 10/30/2025, 5:55:48 PM
Last enriched: 10/30/2025, 6:11:02 PM
Last updated: 10/30/2025, 10:31:25 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-34287: CWE-732 Incorrect Permission Assignment for Critical Resource in Nagios XI
HighCVE-2025-34286: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Nagios XI
CriticalCVE-2025-34135: CWE-732 Incorrect Permission Assignment for Critical Resource in Nagios XI
MediumCVE-2025-34134: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Nagios XI
CriticalCVE-2024-14009: CWE-269 Improper Privilege Management in Nagios XI
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.