Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69437: n/a

0
High
VulnerabilityCVE-2025-69437cvecve-2025-69437
Published: Fri Feb 27 2026 (02/27/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-69437 is a high-severity stored Cross-Site Scripting (XSS) vulnerability affecting PublicCMS version 5. 202506. d and earlier. The vulnerability arises because uploaded PDF files can contain embedded JavaScript payloads that bypass backend PDF security checks in CmsFileUtils. java. When a user uploads a malicious PDF and views it, the embedded script executes, potentially leading to credential theft, arbitrary API execution, and other security issues. This affects all file upload endpoints such as /cmsTemplate/save, /file/doUpload, and others. Exploitation requires user interaction and privileges to upload files but no administrative privileges are explicitly required. The vulnerability has a CVSS score of 8. 7, indicating high severity, with a vector showing network attack, low complexity, privileges required, user interaction, and high impact on confidentiality and integrity.

AI-Powered Analysis

AILast updated: 02/27/2026, 20:10:28 UTC

Technical Analysis

CVE-2025-69437 is a stored Cross-Site Scripting (XSS) vulnerability in PublicCMS v5.202506.d and earlier versions. The root cause lies in the insufficient validation of uploaded PDF files within the backend CmsFileUtils.java component. Attackers can craft PDF documents containing embedded JavaScript payloads that bypass the CMS's PDF security checks. When such a malicious PDF is uploaded through any of the affected file upload endpoints (/cmsTemplate/save, /file/doUpload, /cmsTemplate/doUpload, /file/doBatchUpload, /cmsWebFile/doUpload), the payload is stored persistently. Upon a user viewing the PDF within the CMS interface, the embedded JavaScript executes in the context of the victim’s browser session. This can lead to credential theft, unauthorized API calls, session hijacking, and other malicious activities compromising confidentiality and integrity. The vulnerability requires the attacker to have privileges to upload files and the victim to interact with the malicious content, but it does not require administrative privileges or complex exploitation techniques. The CVSS 3.1 score of 8.7 reflects the high impact on confidentiality and integrity, low attack complexity, and the need for user interaction. No patches or mitigations are currently linked, and no known exploits have been reported in the wild, but the vulnerability poses a significant risk to organizations relying on PublicCMS for content management.

Potential Impact

The impact of CVE-2025-69437 is significant for organizations using vulnerable versions of PublicCMS. Successful exploitation can lead to theft of user credentials, enabling attackers to escalate privileges or gain unauthorized access to sensitive systems. Arbitrary API execution can allow attackers to manipulate backend services, potentially leading to data breaches, unauthorized data modification, or disruption of CMS functionality. The persistent nature of stored XSS means that multiple users can be affected once the malicious PDF is uploaded. This can erode trust in the CMS platform, cause data integrity issues, and expose organizations to regulatory and compliance risks. Given the widespread use of PublicCMS in various sectors, including government, education, and enterprises, the vulnerability could be leveraged for targeted attacks or broader campaigns. The requirement for user interaction and privileges to upload files somewhat limits the attack surface but does not eliminate the risk, especially in environments with many users or weak access controls.

Mitigation Recommendations

To mitigate CVE-2025-69437, organizations should implement the following specific measures: 1) Immediately restrict or disable file upload functionality for non-trusted users until a patch is available. 2) Implement strict validation and sanitization of uploaded PDF files, including using specialized PDF parsing libraries that can detect and remove embedded JavaScript or other active content. 3) Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of XSS attacks. 4) Monitor and audit file uploads and user activity to detect suspicious behavior or anomalous file types. 5) Educate users about the risks of interacting with untrusted content within the CMS. 6) Segregate CMS user roles to minimize the number of users with file upload privileges. 7) Regularly update PublicCMS to the latest version once a patch addressing this vulnerability is released. 8) Consider implementing runtime application self-protection (RASP) or web application firewalls (WAF) with rules targeting PDF-based XSS payloads. These steps go beyond generic advice by focusing on PDF-specific validation and user privilege management tailored to the vulnerability’s exploitation vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1f6db32ffcdb8a26bc2eb

Added to database: 2/27/2026, 7:56:11 PM

Last enriched: 2/27/2026, 8:10:28 PM

Last updated: 2/27/2026, 10:13:21 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses