CVE-2025-14244

2.4 LOW

📋 TL;DR

GreenCMS 2.3.0603 contains a cross-site scripting (XSS) vulnerability in the Menu Management Page's CustomController.class.php file. Attackers can inject malicious scripts via the Link parameter, potentially compromising user sessions or redirecting to malicious sites. This only affects unsupported versions of GreenCMS.

💻 Affected Systems

Products:
  • GreenCMS
Versions: 2.3.0603
Operating Systems: All platforms running GreenCMS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects unsupported versions; requires access to admin interface or user interaction with malicious links.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack sessions, deface websites, or redirect users to malicious sites, potentially leading to full system compromise if combined with other vulnerabilities.

🟠

Likely Case

Session hijacking or credential theft for authenticated users accessing the vulnerable admin interface, potentially leading to unauthorized administrative access.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only affecting users with specific browser configurations.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires user interaction or admin access; proof-of-concept available in public gist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available as product is unsupported. Migrate to supported alternative or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement server-side validation and HTML encoding for all user inputs, especially the Link parameter in CustomController.class.php

Manual code review and modification of /Admin/Controller/CustomController.class.php

Content Security Policy (CSP)

all

Implement strict CSP headers to prevent execution of injected scripts

Add 'Content-Security-Policy' header to web server configuration

🧯 If You Can't Patch

  • Restrict access to admin interface using network segmentation and IP whitelisting
  • Implement web application firewall (WAF) rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check GreenCMS version in admin panel or configuration files; version 2.3.0603 is vulnerable

Check Version:

Check /Application/Common/Conf/config.php or admin panel version display

Verify Fix Applied:

Test Link parameter with XSS payloads after implementing workarounds; verify no script execution occurs

📡 Detection & Monitoring

Log Indicators:

  • Unusual Link parameter values containing script tags or JavaScript in admin access logs
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests with suspicious Link parameters containing script tags or encoded payloads

SIEM Query:

web.url:*Link=*<script* OR web.url:*Link=*javascript:*

🔗 References

📤 Share & Export