CVE-2025-70128: n/a
A Stored Cross-Site Scripting (XSS) vulnerability exists in the PluXml article comments feature for PluXml versions 5.8.22 and earlier. The application fails to properly sanitize or validate user-supplied input in the "link" field of a comment. An attacker can inject arbitrary JavaScript code using a <script> element. The injected payload is stored in the database and subsequently rendered in the Administration panel's "Comments" section when administrators review submitted comments. Importantly, the malicious script is not reflected in the public-facing comments interface, but only within the backend administration view. Alternatively, users of Administrator, Moderator, Manager roles can also directly input crafted payloads into existing comments. This makes the vulnerability a persistent XSS issue targeting administrative users. This affects /core/admin/comments.php, while CVE-2022-24585 affects /core/admin/comment.php, a uniquely distinct vulnerability.
AI Analysis
Technical Summary
CVE-2025-70128 is a stored Cross-Site Scripting (XSS) vulnerability identified in the PluXml content management system, specifically affecting versions 5.8.22 and earlier. The vulnerability exists due to insufficient input validation and sanitization of the 'link' field within the article comments feature. Attackers can inject arbitrary JavaScript code encapsulated within <script> tags, which is then persistently stored in the application's database. When administrators or users with elevated privileges (Administrator, Moderator, Manager) access the Comments section in the backend administration panel (/core/admin/comments.php), the malicious script executes in their browsers. Unlike reflected XSS, this persistent XSS does not affect the public-facing comment display, limiting the attack surface to backend users. Furthermore, authorized users with elevated roles can also craft and inject malicious payloads into existing comments, increasing the risk of insider threats or privilege abuse. The vulnerability is distinct from CVE-2022-24585, which affects a different admin comment interface endpoint. No patches or exploit code are currently publicly available, and no CVSS score has been assigned. The vulnerability's exploitation could lead to session hijacking, credential theft, unauthorized actions within the admin panel, or deployment of further attacks such as malware installation or privilege escalation.
Potential Impact
The primary impact of CVE-2025-70128 is on the confidentiality and integrity of administrative accounts within organizations using PluXml CMS. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of privileged backend users, potentially leading to session hijacking, theft of authentication tokens, or unauthorized administrative actions. This can compromise the entire CMS, enabling attackers to modify content, escalate privileges, or deploy additional malware. Although the public-facing site is not directly affected, the backend compromise can have severe consequences, including data breaches, defacement, or loss of control over the website. Organizations relying on PluXml for content management, especially those with multiple administrators or moderators, face increased risk. The lack of known exploits in the wild suggests limited current impact, but the vulnerability's persistence and targeting of high-privilege users make it a significant threat if weaponized. Additionally, insider threats or compromised admin accounts could leverage this vulnerability to maintain persistence or evade detection.
Mitigation Recommendations
To mitigate CVE-2025-70128, organizations should first verify if they are running PluXml version 5.8.22 or earlier and plan immediate upgrades to patched versions once available. In the absence of official patches, administrators should implement strict input validation and sanitization on the 'link' field in comments, ensuring removal or encoding of script tags and other executable code. Employ Content Security Policy (CSP) headers in the admin panel to restrict script execution sources and reduce the impact of injected scripts. Limit administrative access to trusted personnel and enforce multi-factor authentication (MFA) to reduce the risk of compromised accounts. Regularly audit and sanitize existing comments in the backend to detect and remove any malicious payloads. Monitor administrative user activity for unusual behavior that may indicate exploitation. Additionally, consider isolating the admin interface network-wise and restricting access via VPN or IP whitelisting to reduce exposure. Educate administrators about the risks of clicking on suspicious links or executing untrusted scripts within the admin panel.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Japan, South Korea, Brazil, India
CVE-2025-70128: n/a
Description
A Stored Cross-Site Scripting (XSS) vulnerability exists in the PluXml article comments feature for PluXml versions 5.8.22 and earlier. The application fails to properly sanitize or validate user-supplied input in the "link" field of a comment. An attacker can inject arbitrary JavaScript code using a <script> element. The injected payload is stored in the database and subsequently rendered in the Administration panel's "Comments" section when administrators review submitted comments. Importantly, the malicious script is not reflected in the public-facing comments interface, but only within the backend administration view. Alternatively, users of Administrator, Moderator, Manager roles can also directly input crafted payloads into existing comments. This makes the vulnerability a persistent XSS issue targeting administrative users. This affects /core/admin/comments.php, while CVE-2022-24585 affects /core/admin/comment.php, a uniquely distinct vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2025-70128 is a stored Cross-Site Scripting (XSS) vulnerability identified in the PluXml content management system, specifically affecting versions 5.8.22 and earlier. The vulnerability exists due to insufficient input validation and sanitization of the 'link' field within the article comments feature. Attackers can inject arbitrary JavaScript code encapsulated within <script> tags, which is then persistently stored in the application's database. When administrators or users with elevated privileges (Administrator, Moderator, Manager) access the Comments section in the backend administration panel (/core/admin/comments.php), the malicious script executes in their browsers. Unlike reflected XSS, this persistent XSS does not affect the public-facing comment display, limiting the attack surface to backend users. Furthermore, authorized users with elevated roles can also craft and inject malicious payloads into existing comments, increasing the risk of insider threats or privilege abuse. The vulnerability is distinct from CVE-2022-24585, which affects a different admin comment interface endpoint. No patches or exploit code are currently publicly available, and no CVSS score has been assigned. The vulnerability's exploitation could lead to session hijacking, credential theft, unauthorized actions within the admin panel, or deployment of further attacks such as malware installation or privilege escalation.
Potential Impact
The primary impact of CVE-2025-70128 is on the confidentiality and integrity of administrative accounts within organizations using PluXml CMS. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of privileged backend users, potentially leading to session hijacking, theft of authentication tokens, or unauthorized administrative actions. This can compromise the entire CMS, enabling attackers to modify content, escalate privileges, or deploy additional malware. Although the public-facing site is not directly affected, the backend compromise can have severe consequences, including data breaches, defacement, or loss of control over the website. Organizations relying on PluXml for content management, especially those with multiple administrators or moderators, face increased risk. The lack of known exploits in the wild suggests limited current impact, but the vulnerability's persistence and targeting of high-privilege users make it a significant threat if weaponized. Additionally, insider threats or compromised admin accounts could leverage this vulnerability to maintain persistence or evade detection.
Mitigation Recommendations
To mitigate CVE-2025-70128, organizations should first verify if they are running PluXml version 5.8.22 or earlier and plan immediate upgrades to patched versions once available. In the absence of official patches, administrators should implement strict input validation and sanitization on the 'link' field in comments, ensuring removal or encoding of script tags and other executable code. Employ Content Security Policy (CSP) headers in the admin panel to restrict script execution sources and reduce the impact of injected scripts. Limit administrative access to trusted personnel and enforce multi-factor authentication (MFA) to reduce the risk of compromised accounts. Regularly audit and sanitize existing comments in the backend to detect and remove any malicious payloads. Monitor administrative user activity for unusual behavior that may indicate exploitation. Additionally, consider isolating the admin interface network-wise and restricting access via VPN or IP whitelisting to reduce exposure. Educate administrators about the risks of clicking on suspicious links or executing untrusted scripts within the admin panel.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69b071392f860ef943a5fd3e
Added to database: 3/10/2026, 7:30:01 PM
Last enriched: 3/10/2026, 7:46:56 PM
Last updated: 3/13/2026, 8:33:32 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.