CVE-2025-66468

7.6 HIGH

📋 TL;DR

This CVE describes a stored cross-site scripting (XSS) vulnerability in the Aimeos GrapesJS CMS extension. Malicious editors can inject JavaScript code that executes when other users view affected pages, potentially stealing session cookies or performing unauthorized actions. The vulnerability affects all versions prior to specific patched releases across multiple year branches.

💻 Affected Systems

Products:
  • Aimeos GrapesJS CMS extension
Versions: All versions prior to 2021.10.8, 2022.10.8, 2023.10.8, 2024.10.8, and 2025.10.8
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Vulnerability only exists when the standard Content Security Policy is disabled. Default configuration with CSP enabled is not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over CMS administration, deface websites, or redirect users to malicious sites, potentially leading to complete system compromise.

🟠

Likely Case

Malicious editors could inject scripts that steal user session data, perform actions on behalf of users, or modify page content without authorization.

🟢

If Mitigated

With Content Security Policy (CSP) properly enabled, the attack would be blocked, limiting impact to potential content manipulation by authorized editors.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires editor-level access to inject malicious JavaScript. The vulnerability is straightforward to exploit once an attacker has editor privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.10.8, 2022.10.8, 2023.10.8, 2024.10.8, or 2025.10.8 depending on your branch

Vendor Advisory: https://github.com/aimeos/ai-cms-grapesjs/security/advisories/GHSA-424m-fj2q-g7vg

Restart Required: No

Instructions:

1. Identify which Aimeos GrapesJS branch you're using (2021.x, 2022.x, 2023.x, 2024.x, or 2025.x). 2. Update to the corresponding patched version (2021.10.8, 2022.10.8, 2023.10.8, 2024.10.8, or 2025.10.8). 3. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Enable Content Security Policy

all

Ensure the standard Content Security Policy is enabled and properly configured to block inline scripts and unauthorized script sources.

Restrict Editor Privileges

all

Limit editor access to trusted users only and implement principle of least privilege for content editing roles.

🧯 If You Can't Patch

  • Enable and properly configure Content Security Policy headers to block inline JavaScript execution
  • Implement input validation and output encoding for all user-controllable content in the CMS

🔍 How to Verify

Check if Vulnerable:

Check your Aimeos GrapesJS version and compare against affected versions. If using version prior to 2021.10.8, 2022.10.8, 2023.10.8, 2024.10.8, or 2025.10.8, you are vulnerable if CSP is disabled.

Check Version:

Check composer.json or package.json for the Aimeos GrapesJS version, or use the CMS administration interface if available.

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version for your branch and test that CSP headers are properly configured.

📡 Detection & Monitoring

Log Indicators:

  • Unusual content modifications by editors
  • Multiple failed login attempts to editor accounts
  • Suspicious JavaScript in page content

Network Indicators:

  • Unexpected external script loads from CMS pages
  • Suspicious outbound connections from user browsers after visiting CMS pages

SIEM Query:

source="web_server" AND (message="*editor*" AND message="*javascript*" OR message="*script*" AND status=200)

🔗 References

📤 Share & Export