Action not permitted
Modal body text goes here.
Modal Title
Modal Body
jvndb-2025-010408
Vulnerability from jvndb
Published
2025-08-01 12:05
Modified
2025-08-01 12:05
Severity ?
Summary
Multiple vulnerabilities in PowerCMS
Details
PowerCMS provided by Alfasado Inc. contains multiple vulnerabilities listed below.
* Reflected cross-site scripting (CWE-79) - CVE-2025-36563
* Stored cross-site scripting (CWE-79) - CVE-2025-41391
* Path traversal in file uploading (CWE-22) - CVE-2025-41396
* Path traversal in backup restore (CWE-22) - CVE-2025-46359
* Improper neutralization of formula elements in a CSV file (CWE-1236) - CVE-2025-54752
* Unrestricted upload of file with dangerous type (CWE-434) - CVE-2025-54757
The following people of VCSLab - Viettel Cyber Security reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
thanhtt74 (Tran Thi Thanh)
namdi (Do Ich Nam)
quanlna2 (Le Nguyen Anh Quan)
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/vu/JVNVU93412964/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-36563 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-41391 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-41396 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-46359 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-54752 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-54757 | |
Improper Neutralization of Formula Elements in a CSV File(CWE-1236) | https://cwe.mitre.org/data/definitions/1236.html | |
Path Traversal(CWE-22) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html | |
Unrestricted Upload of File with Dangerous Type(CWE-434) | https://cwe.mitre.org/data/definitions/434.html | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Alfasado Inc. | PowerCMS |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-010408.html", "dc:date": "2025-08-01T12:05+09:00", "dcterms:issued": "2025-08-01T12:05+09:00", "dcterms:modified": "2025-08-01T12:05+09:00", "description": "PowerCMS provided by Alfasado Inc. contains multiple vulnerabilities listed below.\r\n\r\n * Reflected cross-site scripting (CWE-79) - CVE-2025-36563\r\n * Stored cross-site scripting (CWE-79) - CVE-2025-41391\r\n * Path traversal in file uploading (CWE-22) - CVE-2025-41396\r\n * Path traversal in backup restore (CWE-22) - CVE-2025-46359\r\n * Improper neutralization of formula elements in a CSV file (CWE-1236) - CVE-2025-54752\r\n * Unrestricted upload of file with dangerous type (CWE-434) - CVE-2025-54757\r\n\r\nThe following people of VCSLab - Viettel Cyber Security reported these vulnerabilities to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer.\r\n\r\nthanhtt74 (Tran Thi Thanh)\r\nnamdi (Do Ich Nam)\r\nquanlna2 (Le Nguyen Anh Quan)", "link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-010408.html", "sec:cpe": { "#text": "cpe:/a:alfasado:powercms", "@product": "PowerCMS", "@vendor": "Alfasado Inc.", "@version": "2.2" }, "sec:cvss": { "@score": "7.2", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2025-010408", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU93412964/index.html", "@id": "JVNVU#93412964", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-36563", "@id": "CVE-2025-36563", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-41391", "@id": "CVE-2025-41391", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-41396", "@id": "CVE-2025-41396", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-46359", "@id": "CVE-2025-46359", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-54752", "@id": "CVE-2025-54752", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-54757", "@id": "CVE-2025-54757", "@source": "CVE" }, { "#text": "https://cwe.mitre.org/data/definitions/1236.html", "@id": "CWE-1236", "@title": "Improper Neutralization of Formula Elements in a CSV File(CWE-1236)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" }, { "#text": "https://cwe.mitre.org/data/definitions/434.html", "@id": "CWE-434", "@title": "Unrestricted Upload of File with Dangerous Type(CWE-434)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple vulnerabilities in PowerCMS" }
CVE-2025-41391 (GCVE-0-2025-41391)
Vulnerability from cvelistv5
Published
2025-07-31 07:25
Modified
2025-07-31 14:23
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.1 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
5.1 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site scripting (XSS)
Summary
Stored cross-site scripting vulnerability exists in multiple versions of PowerCMS. If a product user accesses a malicious page, an arbitrary script may be executed on the browser.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Alfasado Inc. | PowerCMS |
Version: 6.7 and earlier (PowerCMS 6.x series) |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-41391", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-31T14:23:21.361216Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-31T14:23:47.388Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "6.7 and earlier (PowerCMS 6.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "5.3 and earlier (PowerCMS 5.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "4.6 and earlier (PowerCMS 4.x series)" } ] } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting vulnerability exists in multiple versions of PowerCMS. If a product user accesses a malicious page, an arbitrary script may be executed on the browser." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site scripting (XSS)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-31T07:25:10.798Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.powercms.jp/news/release-powercms-671-531-461.html" }, { "url": "https://jvn.jp/en/vu/JVNVU93412964/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-41391", "datePublished": "2025-07-31T07:25:10.798Z", "dateReserved": "2025-07-30T05:36:41.529Z", "dateUpdated": "2025-07-31T14:23:47.388Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-41396 (GCVE-0-2025-41396)
Vulnerability from cvelistv5
Published
2025-07-31 07:24
Modified
2025-07-31 15:14
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper limitation of a pathname to a restricted directory ('Path Traversal')
Summary
A path traversal issue exists in file uploading feature of multiple versions of PowerCMS. Arbitrary files may be overwritten by a product user.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Alfasado Inc. | PowerCMS |
Version: 6.7 and earlier (PowerCMS 6.x series) |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-41396", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-31T15:08:24.252684Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-31T15:14:06.812Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "6.7 and earlier (PowerCMS 6.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "5.3 and earlier (PowerCMS 5.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "4.6 and earlier (PowerCMS 4.x series)" } ] } ], "descriptions": [ { "lang": "en", "value": "A path traversal issue exists in file uploading feature of multiple versions of PowerCMS. Arbitrary files may be overwritten by a product user." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-31T07:24:20.561Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.powercms.jp/news/release-powercms-671-531-461.html" }, { "url": "https://jvn.jp/en/vu/JVNVU93412964/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-41396", "datePublished": "2025-07-31T07:24:20.561Z", "dateReserved": "2025-07-30T05:36:38.599Z", "dateUpdated": "2025-07-31T15:14:06.812Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-54757 (GCVE-0-2025-54757)
Vulnerability from cvelistv5
Published
2025-07-31 07:20
Modified
2025-07-31 17:28
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
5.1 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
5.1 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-434 - Unrestricted upload of file with dangerous type
Summary
Multiple versions of PowerCMS allow unrestricted upload of dangerous files. If a product administrator accesses a malicious file uploaded by a product user, an arbitrary script may be executed on the browser.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Alfasado Inc. | PowerCMS |
Version: 6.7 and earlier (PowerCMS 6.x series) |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54757", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-31T17:27:47.515677Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-31T17:28:13.000Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "6.7 and earlier (PowerCMS 6.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "5.3 and earlier (PowerCMS 5.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "4.6 and earlier (PowerCMS 4.x series)" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple versions of PowerCMS allow unrestricted upload of dangerous files. If a product administrator accesses a malicious file uploaded by a product user, an arbitrary script may be executed on the browser." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "Unrestricted upload of file with dangerous type", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-31T07:20:30.689Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.powercms.jp/news/release-powercms-671-531-461.html" }, { "url": "https://jvn.jp/en/vu/JVNVU93412964/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-54757", "datePublished": "2025-07-31T07:20:30.689Z", "dateReserved": "2025-07-30T05:36:43.437Z", "dateUpdated": "2025-07-31T17:28:13.000Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-54752 (GCVE-0-2025-54752)
Vulnerability from cvelistv5
Published
2025-07-31 07:21
Modified
2025-07-31 15:44
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
4.8 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
4.8 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-1236 - Improper neutralization of formula elements in a CSV file
Summary
Multiple versions of PowerCMS improperly neutralize formula elements in a CSV file. If a product user creates a malformed entry and a victim user downloads it as a CSV file and opens it in the user's environment, the embedded code may be executed.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Alfasado Inc. | PowerCMS |
Version: 6.7 and earlier (PowerCMS 6.x series) |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54752", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-31T15:39:04.065052Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-31T15:44:45.539Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "6.7 and earlier (PowerCMS 6.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "5.3 and earlier (PowerCMS 5.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "4.6 and earlier (PowerCMS 4.x series)" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple versions of PowerCMS improperly neutralize formula elements in a CSV file. If a product user creates a malformed entry and a victim user downloads it as a CSV file and opens it in the user\u0027s environment, the embedded code may be executed." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1236", "description": "Improper neutralization of formula elements in a CSV file", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-31T07:21:57.639Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.powercms.jp/news/release-powercms-671-531-461.html" }, { "url": "https://jvn.jp/en/vu/JVNVU93412964/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-54752", "datePublished": "2025-07-31T07:21:57.639Z", "dateReserved": "2025-07-30T05:36:44.305Z", "dateUpdated": "2025-07-31T15:44:45.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-46359 (GCVE-0-2025-46359)
Vulnerability from cvelistv5
Published
2025-07-31 07:22
Modified
2025-07-31 15:28
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
8.6 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.6 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper limitation of a pathname to a restricted directory ('Path Traversal')
Summary
A path traversal issue exists in backup and restore feature of multiple versions of PowerCMS. A product administrator may execute arbitrary code by restoring a crafted backup file.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Alfasado Inc. | PowerCMS |
Version: 6.7 and earlier (PowerCMS 6.x series) |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-46359", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-31T15:24:33.388992Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-31T15:28:30.839Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "6.7 and earlier (PowerCMS 6.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "5.3 and earlier (PowerCMS 5.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "4.6 and earlier (PowerCMS 4.x series)" } ] } ], "descriptions": [ { "lang": "en", "value": "A path traversal issue exists in backup and restore feature of multiple versions of PowerCMS. A product administrator may execute arbitrary code by restoring a crafted backup file." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-31T07:22:46.914Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.powercms.jp/news/release-powercms-671-531-461.html" }, { "url": "https://jvn.jp/en/vu/JVNVU93412964/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-46359", "datePublished": "2025-07-31T07:22:46.914Z", "dateReserved": "2025-07-30T05:36:45.484Z", "dateUpdated": "2025-07-31T15:28:30.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-36563 (GCVE-0-2025-36563)
Vulnerability from cvelistv5
Published
2025-07-31 07:25
Modified
2025-07-31 13:24
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site scripting (XSS)
Summary
Reflected cross-site scripting vulnerability exists in multiple versions of PowerCMS. If a product administrator accesses a crafted URL, an arbitrary script may be executed on the browser.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Alfasado Inc. | PowerCMS |
Version: 6.7 and earlier (PowerCMS 6.x series) |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-36563", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-31T13:24:02.701345Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-31T13:24:12.574Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "6.7 and earlier (PowerCMS 6.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "5.3 and earlier (PowerCMS 5.x series)" } ] }, { "product": "PowerCMS", "vendor": "Alfasado Inc.", "versions": [ { "status": "affected", "version": "4.6 and earlier (PowerCMS 4.x series)" } ] } ], "descriptions": [ { "lang": "en", "value": "Reflected cross-site scripting vulnerability exists in multiple versions of PowerCMS. If a product administrator accesses a crafted URL, an arbitrary script may be executed on the browser." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site scripting (XSS)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-31T07:25:44.979Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.powercms.jp/news/release-powercms-671-531-461.html" }, { "url": "https://jvn.jp/en/vu/JVNVU93412964/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-36563", "datePublished": "2025-07-31T07:25:44.979Z", "dateReserved": "2025-07-30T05:36:42.404Z", "dateUpdated": "2025-07-31T13:24:12.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…