CVE-2025-15451

2.4 LOW

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in xnx3 wangmarket CMS versions up to 4.9. Attackers can inject malicious scripts via the Description parameter on the system variables page, potentially compromising user sessions or stealing credentials. The vulnerability affects administrators who access the vulnerable /admin/system/variableSave.do endpoint.

💻 Affected Systems

Products:
  • xnx3 wangmarket
Versions: Up to and including version 4.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the vulnerable /admin/system/variableSave.do endpoint accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, gain full administrative access to the CMS, deface websites, or install backdoors for persistent access.

🟠

Likely Case

Attackers would typically use this to hijack administrator sessions, modify website content, or redirect users to malicious sites.

🟢

If Mitigated

With proper input validation and output encoding, the attack would be prevented, limiting impact to failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires administrator access to the vulnerable endpoint. Public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a version above 4.9 if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize the Description parameter before processing.

Modify /admin/system/variableSave.do to include HTML entity encoding for user inputs

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to block malicious payloads.

Configure WAF to block requests containing <script> tags or JavaScript in Description parameter

🧯 If You Can't Patch

  • Restrict access to /admin/system/variableSave.do endpoint using network ACLs or authentication requirements
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check if your xnx3 wangmarket version is 4.9 or earlier by examining version files or admin panel.

Check Version:

Check version.txt file or admin dashboard for version information

Verify Fix Applied:

Test the Description parameter with XSS payloads like <script>alert('test')</script> to ensure it's properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /admin/system/variableSave.do with script tags in parameters
  • Multiple failed login attempts followed by successful admin access

Network Indicators:

  • HTTP requests containing <script> tags in POST data to the vulnerable endpoint

SIEM Query:

source="web_logs" AND uri_path="/admin/system/variableSave.do" AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:")

🔗 References

📤 Share & Export