CVE-2025-8221: Cross Site Scripting in jerryshensjf JPACookieShop 蛋糕商城JPA版
A vulnerability classified as problematic was found in jerryshensjf JPACookieShop 蛋糕商城JPA版 up to 24a15c02b4f75042c9f7f615a3fed2ec1cefb999. Affected by this vulnerability is the function goodsSearch of the file GoodsCustController.java. The manipulation of the argument keyword leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
AI Analysis
Technical Summary
CVE-2025-8221 is a cross-site scripting (XSS) vulnerability identified in the JPACookieShop 蛋糕商城JPA版 application developed by jerryshensjf. The vulnerability exists in the goodsSearch function within the GoodsCustController.java file. Specifically, the issue arises from improper handling and sanitization of the 'keyword' parameter, which is susceptible to injection of malicious scripts. An attacker can remotely exploit this vulnerability by crafting a specially designed request that includes malicious JavaScript code in the keyword argument. When the application processes this input and renders it in the response without adequate encoding or sanitization, the malicious script executes in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability has been publicly disclosed, and while no confirmed exploits in the wild are reported, the availability of proof-of-concept code increases the risk of exploitation. The product uses a rolling release model, which complicates precise version tracking for affected and patched releases. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, no privileges or authentication required, user interaction needed, and limited impact on confidentiality and integrity but no impact on availability.
Potential Impact
For European organizations using JPACookieShop 蛋糕商城JPA版, this XSS vulnerability poses a moderate risk. Successful exploitation could allow attackers to steal session cookies, impersonate users, or conduct phishing attacks by injecting malicious scripts into web pages viewed by legitimate users. This can lead to unauthorized access to user accounts, data leakage, and reputational damage. E-commerce platforms are particularly sensitive due to the handling of customer data and payment information. Even though the vulnerability does not directly compromise system availability or integrity, the indirect consequences such as loss of customer trust and potential regulatory penalties under GDPR for insufficient protection of personal data could be significant. The remote exploitability and lack of required privileges increase the attack surface, especially for organizations with public-facing instances of this software.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and sanitize all user inputs, especially the 'keyword' parameter in the goodsSearch function, employing context-appropriate output encoding to neutralize malicious scripts. 2) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Conduct thorough code audits focusing on input validation and output encoding across the application. 4) Monitor web application logs for unusual or suspicious requests targeting the goodsSearch endpoint. 5) Engage with the vendor or development team to obtain patches or updates addressing this vulnerability, considering the rolling release model may delay formal patch releases. 6) Educate users and administrators about the risks of XSS and encourage cautious handling of suspicious links or inputs. 7) Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting this specific parameter.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-8221: Cross Site Scripting in jerryshensjf JPACookieShop 蛋糕商城JPA版
Description
A vulnerability classified as problematic was found in jerryshensjf JPACookieShop 蛋糕商城JPA版 up to 24a15c02b4f75042c9f7f615a3fed2ec1cefb999. Affected by this vulnerability is the function goodsSearch of the file GoodsCustController.java. The manipulation of the argument keyword leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
AI-Powered Analysis
Technical Analysis
CVE-2025-8221 is a cross-site scripting (XSS) vulnerability identified in the JPACookieShop 蛋糕商城JPA版 application developed by jerryshensjf. The vulnerability exists in the goodsSearch function within the GoodsCustController.java file. Specifically, the issue arises from improper handling and sanitization of the 'keyword' parameter, which is susceptible to injection of malicious scripts. An attacker can remotely exploit this vulnerability by crafting a specially designed request that includes malicious JavaScript code in the keyword argument. When the application processes this input and renders it in the response without adequate encoding or sanitization, the malicious script executes in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability has been publicly disclosed, and while no confirmed exploits in the wild are reported, the availability of proof-of-concept code increases the risk of exploitation. The product uses a rolling release model, which complicates precise version tracking for affected and patched releases. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, no privileges or authentication required, user interaction needed, and limited impact on confidentiality and integrity but no impact on availability.
Potential Impact
For European organizations using JPACookieShop 蛋糕商城JPA版, this XSS vulnerability poses a moderate risk. Successful exploitation could allow attackers to steal session cookies, impersonate users, or conduct phishing attacks by injecting malicious scripts into web pages viewed by legitimate users. This can lead to unauthorized access to user accounts, data leakage, and reputational damage. E-commerce platforms are particularly sensitive due to the handling of customer data and payment information. Even though the vulnerability does not directly compromise system availability or integrity, the indirect consequences such as loss of customer trust and potential regulatory penalties under GDPR for insufficient protection of personal data could be significant. The remote exploitability and lack of required privileges increase the attack surface, especially for organizations with public-facing instances of this software.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and sanitize all user inputs, especially the 'keyword' parameter in the goodsSearch function, employing context-appropriate output encoding to neutralize malicious scripts. 2) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Conduct thorough code audits focusing on input validation and output encoding across the application. 4) Monitor web application logs for unusual or suspicious requests targeting the goodsSearch endpoint. 5) Engage with the vendor or development team to obtain patches or updates addressing this vulnerability, considering the rolling release model may delay formal patch releases. 6) Educate users and administrators about the risks of XSS and encourage cautious handling of suspicious links or inputs. 7) Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting this specific parameter.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-26T09:35:16.307Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6885a864ad5a09ad006e3eee
Added to database: 7/27/2025, 4:17:40 AM
Last enriched: 8/4/2025, 1:05:48 AM
Last updated: 9/12/2025, 1:07:48 PM
Views: 36
Related Threats
CVE-2025-10387: SQL Injection in codesiddhant Jasmin Ransomware
MediumCVE-2025-10386: Cross Site Scripting in Yida ECMS Consulting Enterprise Management System
MediumCVE-2025-10385: Buffer Overflow in Mercury KM08-708H GiGA WiFi Wave2
HighCVE-2025-10384: Improper Authorization in yangzongzhuan RuoYi
MediumCVE-2025-10374: Improper Authorization in Shenzhen Sixun Business Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.