CVE-2025-64049

4.8 MEDIUM

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in REDAXO CMS 5.20.0 allows remote authenticated users to inject malicious scripts into the module management component. When other users view or edit articles using compromised modules, the scripts execute in their browsers, potentially stealing session cookies or performing unauthorized actions. This affects all REDAXO CMS installations running version 5.20.0 with module management enabled.

💻 Affected Systems

Products:
  • REDAXO CMS
Versions: 5.20.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to module management component. All installations with default configuration are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over CMS administration, deface websites, or redirect users to malicious sites.

🟠

Likely Case

Attackers with module editing privileges could inject scripts that steal user session data or perform limited unauthorized actions within the CMS.

🟢

If Mitigated

With proper input validation and output encoding, scripts would be rendered harmless as text rather than executed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to module management. Public proof-of-concept exists in GitHub disclosures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.20.1 or later

Vendor Advisory: https://github.com/redaxo/redaxo

Restart Required: No

Instructions:

1. Backup your REDAXO installation and database
2. Download REDAXO 5.20.1 or later from official repository
3. Replace existing installation files with patched version
4. Clear browser cache and test module functionality

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation for module output fields to strip or encode script tags

Implement custom validation in module PHP files to sanitize output field input

Content Security Policy

all

Implement strict CSP headers to prevent script execution from untrusted sources

Add 'Content-Security-Policy: script-src 'self'' to web server configuration

🧯 If You Can't Patch

  • Restrict module editing permissions to trusted administrators only
  • Implement web application firewall rules to block XSS payload patterns in POST requests to module endpoints

🔍 How to Verify

Check if Vulnerable:

Check if REDAXO version is exactly 5.20.0 by viewing admin dashboard or checking version.php file

Check Version:

grep "REX_VERSION" redaxo/src/core/version.php

Verify Fix Applied:

Verify installation shows version 5.20.1 or later in admin dashboard

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to module management endpoints with script tags in parameters
  • Multiple failed login attempts followed by module editing activity

Network Indicators:

  • HTTP requests containing <script> tags in POST body to /redaxo/index.php?page=modules paths

SIEM Query:

source="web_logs" AND (uri_path="/redaxo/index.php" AND query_string="*page=modules*" AND (body="*<script>*" OR body="*javascript:*"))

🔗 References

📤 Share & Export