fkie_cve-2025-25460
Vulnerability from fkie_nvd
Published
2025-02-24 16:15
Modified
2025-06-12 20:14
Severity ?
Summary
A stored Cross-Site Scripting (XSS) vulnerability was identified in FlatPress 1.3.1 within the "Add Entry" feature. This vulnerability allows authenticated attackers to inject malicious JavaScript payloads into blog posts, which are executed when other users view the posts. The issue arises due to improper input sanitization of the "TextArea" field in the blog entry submission form.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/RoNiXxCybSeC0101/CVE-2025-25460 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://github.com/flatpressblog/flatpress | Product | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/RoNiXxCybSeC0101/CVE-2025-25460 | Exploit, Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flatpress:flatpress:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CBB1C55B-374C-42DA-8FD8-A56746FE912B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored Cross-Site Scripting (XSS) vulnerability was identified in FlatPress 1.3.1 within the \"Add Entry\" feature. This vulnerability allows authenticated attackers to inject malicious JavaScript payloads into blog posts, which are executed when other users view the posts. The issue arises due to improper input sanitization of the \"TextArea\" field in the blog entry submission form."
},
{
"lang": "es",
"value": "Se identific\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en FlatPress 1.3.1 dentro de la funci\u00f3n \"Add Entry\". Esta vulnerabilidad permite a los atacantes autenticados inyectar payloads de JavaScript maliciosos en las publicaciones del blog, que se ejecutan cuando otros usuarios ven las publicaciones. El problema surge debido a una depuraci\u00f3n incorrecta de la entrada del campo \"TextArea\" en el formulario de env\u00edo de entradas del blog."
}
],
"id": "CVE-2025-25460",
"lastModified": "2025-06-12T20:14:41.587",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-02-24T16:15:14.873",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/RoNiXxCybSeC0101/CVE-2025-25460"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/flatpressblog/flatpress"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/RoNiXxCybSeC0101/CVE-2025-25460"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…