CVE-2025-52161

9.8 CRITICAL

📋 TL;DR

This cross-site scripting (XSS) vulnerability in Scholl Communications AG Weblication CMS Core allows attackers to inject malicious scripts into web pages viewed by other users. All users of Weblication CMS Core version 019.004.000.000 are affected, potentially compromising their sessions and data.

💻 Affected Systems

Products:
  • Scholl Communications AG Weblication CMS Core
Versions: v019.004.000.000
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only this specific version is confirmed affected. Other versions may also be vulnerable but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over the CMS, deface websites, or distribute malware to visitors.

🟠

Likely Case

Session hijacking, credential theft, or website defacement through injected malicious scripts.

🟢

If Mitigated

Limited impact with proper input validation and output encoding in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity and can be exploited without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://herolab.usd.de/security-advisories/usd-2025-0031/

Restart Required: No

Instructions:

Check vendor website for updates. If patch is released, update to the patched version immediately.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add CSP headers to restrict script execution sources

Add 'Content-Security-Policy' header to web server configuration

Enable XSS Protection Headers

all

Add X-XSS-Protection and X-Content-Type-Options headers

X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) with XSS filtering rules
  • Disable or restrict user input fields that accept HTML/JavaScript

🔍 How to Verify

Check if Vulnerable:

Check CMS version in admin panel or configuration files

Check Version:

Check Weblication CMS version in admin interface or config files

Verify Fix Applied:

Test input fields with XSS payloads after applying fixes

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags in input fields
  • Suspicious JavaScript in request logs

Network Indicators:

  • Malicious script injection attempts in HTTP requests

SIEM Query:

web.url:*script* OR web.method:POST AND web.uri:*input*

🔗 References

📤 Share & Export