CVE-2025-14801

2.4 LOW

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts via the content parameter in the createComment function of xiweicheng TMS. When exploited, it enables cross-site scripting attacks that can steal session cookies, redirect users, or perform actions on their behalf. All users running xiweicheng TMS up to version 2.28.0 are affected.

💻 Affected Systems

Products:
  • xiweicheng TMS
Versions: Up to and including 2.28.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full administrative access to the TMS, and potentially compromise the entire system or pivot to internal networks.

🟠

Likely Case

Attackers steal user session cookies, perform unauthorized actions on behalf of users, or redirect users to malicious sites.

🟢

If Mitigated

With proper input validation and output encoding, the impact is limited to minor UI disruption without data theft or privilege escalation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub, making weaponization likely. Attack requires access to the comment creation functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider implementing workarounds or migrating to alternative software.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize HTML content in comment parameters

Implement HTML entity encoding for all user input in createComment function

Content Security Policy

all

Implement CSP headers to restrict script execution

Add header: Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Disable the comment creation functionality entirely
  • Implement a web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Test by submitting a comment with <script>alert('XSS')</script> in the content parameter and check if script executes

Check Version:

Check TMS version in admin panel or configuration files

Verify Fix Applied:

After implementing workarounds, test with the same payload to ensure script does not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual comment submissions with script tags or JavaScript code
  • Multiple failed comment attempts with suspicious content

Network Indicators:

  • HTTP requests to /admin/blog/comment/create with script content in parameters

SIEM Query:

source="/admin/blog/comment/create" AND (content="<script>" OR content="javascript:")

🔗 References

📤 Share & Export