CVE-2025-54544

4.8 MEDIUM

📋 TL;DR

QuickCMS versions including 6.8 are vulnerable to stored cross-site scripting (XSS) via the aDirFilesDescriptions parameter in the files editor. An attacker with admin privileges can inject malicious HTML/JavaScript that executes when users visit affected pages. This primarily affects QuickCMS administrators who could be tricked into executing malicious code.

💻 Affected Systems

Products:
  • QuickCMS
Versions: 6.8 confirmed vulnerable; other versions may be vulnerable but untested
Operating Systems: All platforms running QuickCMS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin privileges to exploit; default admin user cannot normally add JavaScript but this vulnerability bypasses that restriction.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete website compromise through session hijacking, credential theft, defacement, or malware distribution to all visitors.

🟠

Likely Case

Limited impact since it requires admin privileges; most likely used for defacement or targeted attacks against specific users.

🟢

If Mitigated

Minimal impact with proper admin account security and content validation in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials; simple injection via files editor parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Monitor vendor channels for updates.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize aDirFilesDescriptions parameter

Implement HTML/JavaScript sanitization in files editor processing code

Content Security Policy

all

Implement strict CSP headers to prevent script execution

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to HTTP headers

🧯 If You Can't Patch

  • Restrict admin access to trusted users only with strong authentication
  • Implement web application firewall rules to block XSS payloads in aDirFilesDescriptions parameter

🔍 How to Verify

Check if Vulnerable:

Test if HTML/JavaScript in aDirFilesDescriptions parameter persists and executes when viewing edited pages

Check Version:

Check QuickCMS version in admin panel or configuration files

Verify Fix Applied:

Verify that injected scripts are properly sanitized and do not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual file edit activity by admin users
  • Suspicious strings in aDirFilesDescriptions parameter

Network Indicators:

  • HTTP requests with script tags or JavaScript in aDirFilesDescriptions parameter

SIEM Query:

Search for 'aDirFilesDescriptions' containing script tags or JavaScript patterns in web logs

🔗 References

📤 Share & Export