CVE-2025-13058
📋 TL;DR
This CVE describes a cross-site scripting (XSS) vulnerability in soerennb eXtplorer file manager up to version 2.1.15. The flaw exists in the filename handler component and allows attackers to inject malicious scripts that execute in users' browsers. Anyone using affected versions of eXtplorer is vulnerable to this remote attack.
💻 Affected Systems
- soerennb eXtplorer
📦 What is this software?
Extplorer by Extplorer
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, deface the application, or redirect users to malicious sites.
Likely Case
Attackers inject malicious scripts to steal user credentials or session tokens from authenticated users.
If Mitigated
With proper input validation and output encoding, the impact is limited to potential script execution in specific contexts.
🎯 Exploit Status
XSS vulnerabilities typically have low exploitation complexity and can be exploited remotely without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in commit 002def70b985f7012586df2c44368845bf405ab3
Vendor Advisory: https://github.com/soerennb/extplorer/commit/002def70b985f7012586df2c44368845bf405ab3
Restart Required: No
Instructions:
1. Update to the latest version from GitHub. 2. Apply commit 002def70b985f7012586df2c44368845bf405ab3. 3. Verify the fix by testing filename handling functionality.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation to sanitize filename inputs before processing.
Content Security Policy
allImplement CSP headers to restrict script execution sources.
🧯 If You Can't Patch
- Implement WAF rules to block XSS payloads in filename parameters
- Restrict access to eXtplorer to trusted networks only
🔍 How to Verify
Check if Vulnerable:
Check if eXtplorer version is 2.1.15 or earlier. Test by attempting to upload files with XSS payloads in filenames.
Check Version:
Check the version in the eXtplorer interface or review the source code version information.
Verify Fix Applied:
Verify that commit 002def70b985f7012586df2c44368845bf405ab3 is applied. Test filename handling with XSS payloads to confirm they are properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual filename patterns containing script tags or JavaScript code
- Multiple failed upload attempts with suspicious filenames
Network Indicators:
- HTTP requests with XSS payloads in filename parameters
- Unusual outbound connections following file uploads
SIEM Query:
web_requests WHERE url CONTAINS "<script>" OR url CONTAINS "javascript:" AND url CONTAINS "extplorer"
🔗 References
- https://github.com/soerennb/extplorer/
- https://github.com/soerennb/extplorer/commit/002def70b985f7012586df2c44368845bf405ab3
- https://github.com/soerennb/extplorer/issues/33
- https://vuldb.com/?ctiid.332185
- https://vuldb.com/?id.332185
- https://vuldb.com/?submit.682370
- https://github.com/soerennb/extplorer/issues/33