CVE-2025-47204

6.1 MEDIUM

📋 TL;DR

This vulnerability in bootstrap-multiselect 1.1.2 allows attackers to execute arbitrary JavaScript code in users' browsers through reflected XSS. Developers who directly use the vulnerable post.php script in their web applications are affected. The vulnerability can be triggered via CSRF, potentially leading to session hijacking or malicious actions.

💻 Affected Systems

Products:
  • bootstrap-multiselect
Versions: 1.1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects developers who directly use the vulnerable post.php script in their applications. Not vulnerable if the script is not included or if proper input validation is implemented.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal user sessions, perform actions as authenticated users, redirect to malicious sites, or install malware via browser exploitation.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized actions performed in the context of authenticated users.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and CSRF protections in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the vulnerable script to be accessible and the attacker to trick a user into visiting a malicious page or clicking a crafted link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.3 or later

Vendor Advisory: https://github.com/davidstutz/bootstrap-multiselect/releases

Restart Required: No

Instructions:

1. Update bootstrap-multiselect to version 1.1.3 or later. 2. Replace the vulnerable post.php file with the patched version. 3. Test the application to ensure functionality is preserved.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement proper input validation and output encoding in the application code to prevent XSS.

Remove Vulnerable Script

linux

Remove or disable the post.php script if it's not required for application functionality.

rm /path/to/post.php

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Deploy WAF rules to block XSS payloads and suspicious POST requests

🔍 How to Verify

Check if Vulnerable:

Check if post.php exists in the bootstrap-multiselect directory and if it echoes POST data without proper sanitization.

Check Version:

Check the version in the bootstrap-multiselect files or package manager (e.g., composer show davidstutz/bootstrap-multiselect)

Verify Fix Applied:

Verify the bootstrap-multiselect version is 1.1.3 or later and test that POST data is properly sanitized before output.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to post.php with JavaScript payloads
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing script tags or JavaScript in POST parameters
  • Traffic patterns suggesting CSRF attacks

SIEM Query:

source="web_server" AND uri="*post.php*" AND (POST_data="*<script>*" OR POST_data="*javascript:*")

🔗 References

📤 Share & Export