CVE-2025-65956: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getformwork formwork
Formwork is a flat file-based Content Management System (CMS). Prior to version 2.2.0, inserting unsanitized data into the blog tag field results in stored cross‑site scripting (XSS). Any user with credentials to the Formwork CMS who accesses or edits an affected blog post will have attacker‑controlled script executed in their browser. The issue is persistent and impacts privileged administrative workflows. This issue has been patched in version 2.2.0.
AI Analysis
Technical Summary
CVE-2025-65956 is a stored cross-site scripting (XSS) vulnerability identified in the Formwork CMS, a flat file-based content management system. The vulnerability exists in versions prior to 2.2.0 and is caused by improper neutralization of input during web page generation, specifically in the blog tag field. Attackers who have valid credentials to the CMS can insert malicious JavaScript code into this field without proper sanitization. When an administrator or any privileged user accesses or edits the affected blog post, the injected script executes within their browser context. This persistent XSS flaw can be exploited to hijack user sessions, steal authentication tokens, perform unauthorized actions on behalf of the user, or pivot further into the network. The vulnerability impacts confidentiality, integrity, and availability of administrative workflows, as the attacker-controlled script runs with the privileges of the authenticated user. Exploitation requires authentication and user interaction (viewing or editing the post), but no complex attack vectors or elevated privileges beyond normal CMS user rights are necessary. The vulnerability has been assigned a CVSS v3.1 score of 6.5, indicating a medium severity level. The vendor has addressed the issue in Formwork version 2.2.0 by implementing proper input sanitization and output encoding to prevent script injection. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk to organizations relying on Formwork CMS for content management, especially those with multiple administrators or privileged users.
Potential Impact
For European organizations using Formwork CMS, this vulnerability poses a risk primarily to administrative users who manage website content. Successful exploitation can lead to session hijacking, credential theft, and unauthorized administrative actions, potentially resulting in website defacement, data leakage, or further compromise of internal systems. The persistence of the injected script means that multiple users can be affected over time, increasing the attack surface. Given that Formwork is a CMS, organizations in sectors such as media, education, government, and small to medium enterprises that rely on this platform for public-facing websites are at risk. The impact extends beyond the website itself, as compromised administrative accounts can be leveraged to access internal networks or sensitive data. Additionally, the vulnerability could be used to distribute malware or phishing content to site visitors if attackers escalate privileges or inject malicious payloads. The requirement for authentication limits exposure to external unauthenticated attackers but does not eliminate risk from insider threats or compromised credentials. The medium severity rating suggests that while the vulnerability is not trivially exploitable by outsiders, it still warrants prompt remediation to protect critical administrative workflows and maintain trust in web services.
Mitigation Recommendations
European organizations should immediately upgrade Formwork CMS to version 2.2.0 or later, where the vulnerability is patched. Until the upgrade can be performed, administrators should restrict access to the CMS to trusted users only and enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Regularly audit user accounts and permissions to ensure that only necessary personnel have administrative privileges. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting the execution of unauthorized scripts. Monitor CMS logs and web traffic for unusual activity indicative of exploitation attempts. Educate CMS users about the risks of XSS and the importance of cautious interaction with content, especially when editing or reviewing blog posts. Consider deploying web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the blog tag field. Finally, conduct periodic security assessments of the CMS environment to identify and remediate any residual or related vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-65956: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getformwork formwork
Description
Formwork is a flat file-based Content Management System (CMS). Prior to version 2.2.0, inserting unsanitized data into the blog tag field results in stored cross‑site scripting (XSS). Any user with credentials to the Formwork CMS who accesses or edits an affected blog post will have attacker‑controlled script executed in their browser. The issue is persistent and impacts privileged administrative workflows. This issue has been patched in version 2.2.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-65956 is a stored cross-site scripting (XSS) vulnerability identified in the Formwork CMS, a flat file-based content management system. The vulnerability exists in versions prior to 2.2.0 and is caused by improper neutralization of input during web page generation, specifically in the blog tag field. Attackers who have valid credentials to the CMS can insert malicious JavaScript code into this field without proper sanitization. When an administrator or any privileged user accesses or edits the affected blog post, the injected script executes within their browser context. This persistent XSS flaw can be exploited to hijack user sessions, steal authentication tokens, perform unauthorized actions on behalf of the user, or pivot further into the network. The vulnerability impacts confidentiality, integrity, and availability of administrative workflows, as the attacker-controlled script runs with the privileges of the authenticated user. Exploitation requires authentication and user interaction (viewing or editing the post), but no complex attack vectors or elevated privileges beyond normal CMS user rights are necessary. The vulnerability has been assigned a CVSS v3.1 score of 6.5, indicating a medium severity level. The vendor has addressed the issue in Formwork version 2.2.0 by implementing proper input sanitization and output encoding to prevent script injection. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk to organizations relying on Formwork CMS for content management, especially those with multiple administrators or privileged users.
Potential Impact
For European organizations using Formwork CMS, this vulnerability poses a risk primarily to administrative users who manage website content. Successful exploitation can lead to session hijacking, credential theft, and unauthorized administrative actions, potentially resulting in website defacement, data leakage, or further compromise of internal systems. The persistence of the injected script means that multiple users can be affected over time, increasing the attack surface. Given that Formwork is a CMS, organizations in sectors such as media, education, government, and small to medium enterprises that rely on this platform for public-facing websites are at risk. The impact extends beyond the website itself, as compromised administrative accounts can be leveraged to access internal networks or sensitive data. Additionally, the vulnerability could be used to distribute malware or phishing content to site visitors if attackers escalate privileges or inject malicious payloads. The requirement for authentication limits exposure to external unauthenticated attackers but does not eliminate risk from insider threats or compromised credentials. The medium severity rating suggests that while the vulnerability is not trivially exploitable by outsiders, it still warrants prompt remediation to protect critical administrative workflows and maintain trust in web services.
Mitigation Recommendations
European organizations should immediately upgrade Formwork CMS to version 2.2.0 or later, where the vulnerability is patched. Until the upgrade can be performed, administrators should restrict access to the CMS to trusted users only and enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Regularly audit user accounts and permissions to ensure that only necessary personnel have administrative privileges. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting the execution of unauthorized scripts. Monitor CMS logs and web traffic for unusual activity indicative of exploitation attempts. Educate CMS users about the risks of XSS and the importance of cautious interaction with content, especially when editing or reviewing blog posts. Consider deploying web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the blog tag field. Finally, conduct periodic security assessments of the CMS environment to identify and remediate any residual or related vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-18T16:14:56.693Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69263c525765e822eef59465
Added to database: 11/25/2025, 11:31:30 PM
Last enriched: 12/2/2025, 11:37:44 PM
Last updated: 1/10/2026, 10:15:08 PM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.