CVE-2025-41058

5.4 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in appRain CMF allows authenticated attackers to inject malicious scripts into web pages. When other users view affected pages, the scripts execute in their browsers, potentially stealing session cookies or performing actions on their behalf. Only appRain CMF 4.0.5 installations with authenticated user access are affected.

💻 Affected Systems

Products:
  • appRain CMF
Versions: 4.0.5
Operating Systems: Any OS running appRain CMF
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to the developer/addons interface

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, gain full administrative access, deface websites, or redirect users to malicious sites.

🟠

Likely Case

Attackers with authenticated access could steal other users' session data, perform actions as those users, or deploy basic phishing attacks.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of the vulnerable endpoint

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 4.0.5

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-apprain-cmf

Restart Required: No

Instructions:

1. Update appRain CMF to the latest version. 2. Verify the update applied correctly. 3. Test the affected functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation for the 'data[Addon][layouts]' and 'data[Addon][layouts_except]' parameters

Output Encoding

all

Apply proper HTML encoding to user-controlled data before rendering in web pages

🧯 If You Can't Patch

  • Restrict access to the /apprain/developer/addons/update/row_manager endpoint to trusted administrators only
  • Implement a web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check if running appRain CMF version 4.0.5 and test if the /apprain/developer/addons/update/row_manager endpoint accepts unvalidated input in the specified parameters

Check Version:

Check appRain CMF configuration files or admin panel for version information

Verify Fix Applied:

After updating, test that the vulnerable endpoint properly validates and sanitizes input in the 'data[Addon][layouts]' and 'data[Addon][layouts_except]' parameters

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /apprain/developer/addons/update/row_manager with script tags or JavaScript in parameters
  • Multiple failed XSS attempts

Network Indicators:

  • HTTP requests containing script payloads in the 'data[Addon][layouts]' or 'data[Addon][layouts_except]' parameters

SIEM Query:

source="web_server" AND (url_path="/apprain/developer/addons/update/row_manager" AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:"))

🔗 References

📤 Share & Export