Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64112: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms

0
High
VulnerabilityCVE-2025-64112cvecve-2025-64112cwe-79
Published: Thu Oct 30 2025 (10/30/2025, 17:47:01 UTC)
Source: CVE Database V5
Vendor/Project: statamic
Product: cms

Description

CVE-2025-64112 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in Statamic CMS versions prior to 5. 22. 1. It allows authenticated users with content creation permissions to inject malicious JavaScript into Collections and Taxonomies, which executes when viewed by users with higher privileges. Exploitation requires user interaction and authenticated access but can lead to full compromise of confidentiality, integrity, and availability of affected systems. The vulnerability is fixed in version 5. 22. 1. European organizations using Statamic CMS should prioritize patching to prevent potential privilege escalation and data breaches. No known exploits are currently in the wild, but the ease of exploitation and impact warrant urgent mitigation.

AI-Powered Analysis

AILast updated: 10/30/2025, 18:11:02 UTC

Technical Analysis

CVE-2025-64112 is a stored Cross-Site Scripting (XSS) vulnerability identified in Statamic CMS, a Laravel and Git-powered content management system widely used for managing web content. The vulnerability arises from improper neutralization of input during web page generation, specifically within the Collections and Taxonomies features. Authenticated users who have permissions to create or modify content can inject malicious JavaScript payloads into these components. When higher-privileged users view the compromised content, the injected scripts execute in their browsers, potentially allowing attackers to hijack sessions, steal credentials, perform actions on behalf of the victim, or pivot further into the network. The vulnerability requires the attacker to have at least content creation privileges and the victim to interact with the malicious content, which limits exploitation scope but still poses significant risk. The CVSS v3.1 base score is 8.0, reflecting high severity due to network attack vector, low attack complexity, required privileges, and user interaction. The vulnerability affects all Statamic CMS versions prior to 5.22.1, where the issue has been patched. No public exploits have been reported yet, but the vulnerability's nature and impact make it a critical concern for organizations relying on Statamic for content management.

Potential Impact

For European organizations, this vulnerability can lead to severe consequences including unauthorized access to sensitive information, session hijacking, and potential full compromise of administrative accounts within the CMS environment. This can result in defacement, data leakage, or further lateral movement within corporate networks. Organizations in sectors such as government, finance, media, and e-commerce that rely on Statamic CMS for managing critical web content are particularly at risk. The exploitation could disrupt service availability and damage organizational reputation. Given the requirement for authenticated access, insider threats or compromised low-privilege accounts could be leveraged to escalate privileges and execute attacks. The impact extends beyond the CMS itself, as attackers could use the foothold to target backend systems or steal confidential data. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score indicates urgency.

Mitigation Recommendations

1. Immediately upgrade all Statamic CMS instances to version 5.22.1 or later to apply the official patch addressing this vulnerability. 2. Restrict content creation permissions strictly to trusted users and regularly review user roles to minimize the attack surface. 3. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS payloads by restricting script execution sources. 4. Conduct regular audits of Collections and Taxonomies content for suspicious or unexpected script injections. 5. Employ web application firewalls (WAF) with rules tuned to detect and block XSS payloads targeting Statamic CMS. 6. Monitor logs and user activity for anomalous behavior indicative of exploitation attempts or privilege escalation. 7. Educate content creators and administrators about the risks of XSS and safe content handling practices. 8. Consider implementing multi-factor authentication (MFA) for CMS access to reduce risk from compromised credentials. 9. Isolate the CMS environment from critical backend systems to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-27T15:26:14.127Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6903a6a4aebfcd54748ac668

Added to database: 10/30/2025, 5:55:48 PM

Last enriched: 10/30/2025, 6:11:02 PM

Last updated: 10/30/2025, 10:31:25 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats