CVE-2025-15374

3.5 LOW

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into the Ask module of EyouCMS through content manipulation, resulting in cross-site scripting (XSS). The attack can be executed remotely against EyouCMS versions up to 1.7.7. Website administrators and users who interact with the Ask module are potentially affected.

💻 Affected Systems

Products:
  • EyouCMS
Versions: Up to and including 1.7.7
Operating Systems: All platforms running EyouCMS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the Ask module's content parameter handling. Any EyouCMS installation with the Ask module enabled is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to account compromise or data theft.

🟠

Likely Case

Attackers inject malicious scripts that execute in users' browsers, potentially stealing session tokens or displaying phishing content to users interacting with the Ask module.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be neutralized, preventing execution in users' browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit is publicly available and can be executed remotely without authentication. Attack complexity is low as it involves simple script injection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.8

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Backup your current EyouCMS installation. 2. Download EyouCMS version 1.7.8 from the official vendor. 3. Replace the affected file application/home/model/Ask.php with the patched version. 4. Verify the fix by testing the Ask module functionality.

🔧 Temporary Workarounds

Disable Ask Module

all

Temporarily disable the vulnerable Ask module to prevent exploitation

Navigate to EyouCMS admin panel > Module Management > Disable Ask module

Input Validation Filter

all

Implement server-side input validation to sanitize content parameter

Add input sanitization in application/home/model/Ask.php before processing content parameter

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with XSS protection rules
  • Disable the Ask module entirely until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check if your EyouCMS version is 1.7.7 or earlier and if the Ask module is enabled

Check Version:

Check the version in EyouCMS admin panel or examine the version file in the installation directory

Verify Fix Applied:

Verify that the Ask.php file has been updated to version 1.7.8 and test XSS payloads in the content parameter

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Ask module with script tags in content parameter
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing script tags or JavaScript code in content parameter to Ask module endpoints

SIEM Query:

source="web_server" AND (uri_path="/ask" OR uri_path="*Ask.php*") AND (content="*<script>*" OR content="*javascript:*")

🔗 References

📤 Share & Export