CVE-2025-9981: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenSolution QuickCMS
QuickCMS is vulnerable to multiple Stored XSS in slider editor functionality (sliders-form). Malicious attacker with admin privileges can inject arbitrary HTML and JS into website, which will be rendered/executed on every page. By default admin user is not able to add JavaScript into the website. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI Analysis
Technical Summary
CVE-2025-9981 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in OpenSolution's QuickCMS product, specifically version 6.8. The vulnerability resides in the slider editor functionality (sliders-form), where an attacker with administrative privileges can inject arbitrary HTML and JavaScript code into the website content. This malicious code is then stored and rendered on every page, potentially affecting all visitors and users of the site. While the default admin user interface restricts direct JavaScript insertion, the vulnerability allows bypassing these restrictions under certain conditions, enabling script injection. The vendor was notified early but has not disclosed detailed vulnerability information or released patches, and other versions beyond 6.8 have not been tested but might also be vulnerable. The CVSS 4.0 score of 4.8 reflects a medium severity, considering the attack vector is network-based, requires high privileges (admin), and some user interaction, but does not impact confidentiality, integrity, or availability directly. No known exploits are currently reported in the wild. This vulnerability could be leveraged for persistent XSS attacks, leading to session hijacking, defacement, or distribution of malware through the affected CMS websites.
Potential Impact
For European organizations using QuickCMS version 6.8, this vulnerability poses a risk of persistent XSS attacks that can compromise website visitors and internal users. Attackers with admin access could inject malicious scripts that execute in the context of the website, potentially stealing session tokens, redirecting users to malicious sites, or defacing web content. This could damage organizational reputation, lead to data breaches, and violate data protection regulations such as GDPR if personal data is compromised. Since the vulnerability requires admin privileges, the primary risk is insider threats or compromised admin accounts. The lack of vendor response and patches increases the risk exposure duration. Organizations running QuickCMS on public-facing websites, especially those handling sensitive user data or critical services, are at higher risk. The impact on availability and integrity is limited but the confidentiality of user sessions and data could be affected.
Mitigation Recommendations
1. Restrict administrative access to QuickCMS to trusted personnel only and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 2. Conduct a thorough review of all slider editor content for injected or suspicious scripts and remove any unauthorized code. 3. Implement Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 4. Monitor web server logs and CMS activity for unusual admin actions or content changes. 5. If possible, upgrade to a newer, patched version of QuickCMS once available or consider alternative CMS solutions with active security support. 6. Employ web application firewalls (WAF) with rules to detect and block XSS payloads targeting the slider editor endpoints. 7. Educate administrators about the risks of XSS and safe content management practices. 8. Regularly back up website content to enable quick restoration in case of defacement or compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-9981: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenSolution QuickCMS
Description
QuickCMS is vulnerable to multiple Stored XSS in slider editor functionality (sliders-form). Malicious attacker with admin privileges can inject arbitrary HTML and JS into website, which will be rendered/executed on every page. By default admin user is not able to add JavaScript into the website. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI-Powered Analysis
Technical Analysis
CVE-2025-9981 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in OpenSolution's QuickCMS product, specifically version 6.8. The vulnerability resides in the slider editor functionality (sliders-form), where an attacker with administrative privileges can inject arbitrary HTML and JavaScript code into the website content. This malicious code is then stored and rendered on every page, potentially affecting all visitors and users of the site. While the default admin user interface restricts direct JavaScript insertion, the vulnerability allows bypassing these restrictions under certain conditions, enabling script injection. The vendor was notified early but has not disclosed detailed vulnerability information or released patches, and other versions beyond 6.8 have not been tested but might also be vulnerable. The CVSS 4.0 score of 4.8 reflects a medium severity, considering the attack vector is network-based, requires high privileges (admin), and some user interaction, but does not impact confidentiality, integrity, or availability directly. No known exploits are currently reported in the wild. This vulnerability could be leveraged for persistent XSS attacks, leading to session hijacking, defacement, or distribution of malware through the affected CMS websites.
Potential Impact
For European organizations using QuickCMS version 6.8, this vulnerability poses a risk of persistent XSS attacks that can compromise website visitors and internal users. Attackers with admin access could inject malicious scripts that execute in the context of the website, potentially stealing session tokens, redirecting users to malicious sites, or defacing web content. This could damage organizational reputation, lead to data breaches, and violate data protection regulations such as GDPR if personal data is compromised. Since the vulnerability requires admin privileges, the primary risk is insider threats or compromised admin accounts. The lack of vendor response and patches increases the risk exposure duration. Organizations running QuickCMS on public-facing websites, especially those handling sensitive user data or critical services, are at higher risk. The impact on availability and integrity is limited but the confidentiality of user sessions and data could be affected.
Mitigation Recommendations
1. Restrict administrative access to QuickCMS to trusted personnel only and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 2. Conduct a thorough review of all slider editor content for injected or suspicious scripts and remove any unauthorized code. 3. Implement Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 4. Monitor web server logs and CMS activity for unusual admin actions or content changes. 5. If possible, upgrade to a newer, patched version of QuickCMS once available or consider alternative CMS solutions with active security support. 6. Employ web application firewalls (WAF) with rules to detect and block XSS payloads targeting the slider editor endpoints. 7. Educate administrators about the risks of XSS and safe content management practices. 8. Regularly back up website content to enable quick restoration in case of defacement or compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-09-04T13:00:32.987Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f9f86d3c8ea3a7c43ca072
Added to database: 10/23/2025, 9:42:05 AM
Last enriched: 10/30/2025, 9:57:50 AM
Last updated: 12/5/2025, 3:22:31 PM
Views: 173
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64057: n/a
HighCVE-2025-14088: Improper Authorization in ketr JEPaaS
MediumCVE-2025-14086: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-14085: Improper Control of Dynamically-Identified Variables in youlaitech youlai-mall
MediumCVE-2025-58098: CWE-201 Insertion of Sensitive Information Into Sent Data in Apache Software Foundation Apache HTTP Server
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.