CVE-2025-15093

4.3 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in sunkaifei FlyCMS's admin login component. Attackers can inject malicious scripts via the redirectUrl parameter, potentially compromising admin sessions. All FlyCMS deployments up to commit abbaa5a8daefb146ad4d61027035026b052cb414 are affected.

💻 Affected Systems

Products:
  • sunkaifei FlyCMS
Versions: All versions up to commit abbaa5a8daefb146ad4d61027035026b052cb414
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the admin login component specifically. Continuous delivery model means exact version numbers are unavailable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Admin account takeover leading to complete system compromise, data theft, or website defacement.

🟠

Likely Case

Session hijacking of admin users, credential theft, or unauthorized administrative actions.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available in GitHub issues. Attack requires admin login interaction but can be initiated remotely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider applying community fixes or migrating to alternative software.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize redirectUrl parameter

Modify src/main/java/com/flycms/web/system/IndexAdminController.java to validate redirectUrl against allowed domains

Content Security Policy

all

Implement CSP headers to restrict script execution

Add Content-Security-Policy header to web server configuration

🧯 If You Can't Patch

  • Restrict admin panel access to trusted IP addresses only
  • Implement web application firewall (WAF) rules to block XSS payloads in redirectUrl parameter

🔍 How to Verify

Check if Vulnerable:

Test admin login with redirectUrl parameter containing XSS payload like <script>alert('test')</script>

Check Version:

Check git commit hash: git log --oneline -1

Verify Fix Applied:

Verify that XSS payloads in redirectUrl are properly sanitized or blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirectUrl parameters in admin login requests
  • JavaScript payloads in URL parameters

Network Indicators:

  • HTTP requests with script tags in redirectUrl parameter to admin endpoints

SIEM Query:

web.url:*redirectUrl=*<script* OR web.url:*redirectUrl=*javascript:*

🔗 References

📤 Share & Export