Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70959: n/a

0
Medium
VulnerabilityCVE-2025-70959cvecve-2025-70959
Published: Mon Feb 02 2026 (02/02/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored cross-site scripting (XSS) vulnerability in the Jobs module of Tendenci CMS v15.3.7 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:34:50 UTC

Technical Analysis

CVE-2025-70959 is a stored cross-site scripting (XSS) vulnerability identified in the Jobs module of Tendenci CMS version 15.3.7. Stored XSS occurs when malicious input is saved by the application and later rendered in web pages without proper sanitization, allowing attackers to execute arbitrary JavaScript or HTML in the context of other users' browsers. In this case, the vulnerability arises from insufficient input validation or output encoding in the Jobs module, enabling attackers to inject crafted payloads that persist in the system. When legitimate users view the affected job postings or related pages, the malicious scripts execute, potentially leading to session hijacking, theft of cookies or credentials, defacement, or redirection to malicious sites. The vulnerability does not require user interaction beyond visiting the compromised page, and no authentication is needed to inject the payload if the Jobs module allows public submissions or if an attacker has access to submit job entries. Although no public exploits or patches are currently available, the risk remains significant due to the commonality of stored XSS attacks and their impact on web application security. Tendenci CMS is used by various organizations for membership management and job postings, making this vulnerability relevant for sites relying on this platform for recruitment or job board functionalities. The absence of a CVSS score requires an assessment based on the vulnerability's characteristics, which indicate a high severity due to the potential for widespread impact on confidentiality and integrity, ease of exploitation, and the persistent nature of stored XSS.

Potential Impact

For European organizations, exploitation of this stored XSS vulnerability could lead to unauthorized access to user sessions, theft of sensitive information such as login credentials, and manipulation of website content. This can damage organizational reputation, lead to data breaches, and facilitate further attacks such as phishing or malware distribution. Organizations using Tendenci CMS for recruitment or job postings may expose their employees, applicants, and visitors to these risks. The impact is particularly concerning for sectors handling sensitive personal data, including HR departments, educational institutions, and professional associations. Additionally, compromised websites may face regulatory scrutiny under GDPR for failing to protect user data adequately. The persistent nature of stored XSS means that once exploited, the malicious payload can affect all users accessing the infected pages until remediation occurs, increasing the potential scope of impact.

Mitigation Recommendations

Organizations should monitor Tendenci CMS vendor communications for official patches addressing this vulnerability and apply them promptly once available. In the interim, implement strict input validation and output encoding on all user-submitted content in the Jobs module to prevent injection of malicious scripts. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Utilize Web Application Firewalls (WAFs) configured to detect and block common XSS attack patterns targeting the Jobs module. Conduct regular security audits and penetration testing focusing on input handling in the CMS. Restrict job posting permissions to trusted users where possible to reduce the attack surface. Educate administrators and content managers about the risks of XSS and safe content handling practices. Finally, monitor web logs and user reports for signs of suspicious activity indicative of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69813004f9fa50a62f63a38c

Added to database: 2/2/2026, 11:15:16 PM

Last enriched: 2/2/2026, 11:34:50 PM

Last updated: 2/5/2026, 3:18:54 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats