CVE-2025-41043

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers to inject malicious scripts into appRain CMF that execute when other users view affected pages. It affects all users of appRain CMF version 4.0.5 who have access to the AppReportCode management interface. The stored XSS can lead to session hijacking, credential theft, or unauthorized actions.

💻 Affected Systems

Products:
  • appRain CMF
Versions: 4.0.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the AppReportCode management interface at /apprain/appreport/manage/

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take full control of the CMS, deface websites, or pivot to internal systems.

🟠

Likely Case

Authenticated users with malicious intent could hijack sessions of other users, steal cookies, or perform unauthorized actions within the CMS.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be neutralized with minimal impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of the vulnerable parameters. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.0.6 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-apprain-cmf

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download the latest version from the official appRain repository. 3. Replace vulnerable files with patched versions. 4. Verify the fix by testing the affected parameters.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation for the 'data[AppReportCode][id]' and 'data[AppReportCode][name]' parameters

Output Encoding

all

Apply proper HTML encoding to all user-controlled data before rendering in web pages

🧯 If You Can't Patch

  • Restrict access to /apprain/appreport/manage/ to only trusted administrators
  • Implement a web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check if your appRain CMF version is 4.0.5 by examining the version file or admin panel

Check Version:

Check the version.php file or admin dashboard for version information

Verify Fix Applied:

Test the vulnerable parameters with XSS payloads and verify they are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /apprain/appreport/manage/ with script tags in parameters
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing <script> tags in the 'data[AppReportCode][id]' or 'data[AppReportCode][name]' parameters

SIEM Query:

source="web_server" AND (uri="/apprain/appreport/manage/" AND (param="data[AppReportCode][id]" OR param="data[AppReportCode][name]") AND value MATCHES "<script>")

🔗 References

📤 Share & Export