CVE-2025-54544
📋 TL;DR
QuickCMS versions including 6.8 are vulnerable to stored cross-site scripting (XSS) via the aDirFilesDescriptions parameter in the files editor. An attacker with admin privileges can inject malicious HTML/JavaScript that executes when users visit affected pages. This primarily affects QuickCMS administrators who could be tricked into executing malicious code.
💻 Affected Systems
- QuickCMS
📦 What is this software?
Quick Cms by Opensolution
⚠️ Risk & Real-World Impact
Worst Case
Complete website compromise through session hijacking, credential theft, defacement, or malware distribution to all visitors.
Likely Case
Limited impact since it requires admin privileges; most likely used for defacement or targeted attacks against specific users.
If Mitigated
Minimal impact with proper admin account security and content validation in place.
🎯 Exploit Status
Exploitation requires admin credentials; simple injection via files editor parameter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Monitor vendor channels for updates.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation to sanitize aDirFilesDescriptions parameter
Implement HTML/JavaScript sanitization in files editor processing code
Content Security Policy
allImplement strict CSP headers to prevent script execution
Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to HTTP headers
🧯 If You Can't Patch
- Restrict admin access to trusted users only with strong authentication
- Implement web application firewall rules to block XSS payloads in aDirFilesDescriptions parameter
🔍 How to Verify
Check if Vulnerable:
Test if HTML/JavaScript in aDirFilesDescriptions parameter persists and executes when viewing edited pages
Check Version:
Check QuickCMS version in admin panel or configuration files
Verify Fix Applied:
Verify that injected scripts are properly sanitized and do not execute
📡 Detection & Monitoring
Log Indicators:
- Unusual file edit activity by admin users
- Suspicious strings in aDirFilesDescriptions parameter
Network Indicators:
- HTTP requests with script tags or JavaScript in aDirFilesDescriptions parameter
SIEM Query:
Search for 'aDirFilesDescriptions' containing script tags or JavaScript patterns in web logs