CVE-2025-57692
BaseFortify
Publication date: 2025-09-26
Last updated on: 2025-10-07
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dotnetfoundation | piranha_cms | 12.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in PiranhaCMS 12.0 is a stored Cross-Site Scripting (XSS) issue found in the Text content block of Standard and Standard Archive Pages via the /manager/pages interface. It allows an attacker to inject and store malicious JavaScript code that will execute in the browsers of other users who view the affected pages.
How can this vulnerability impact me? :
The vulnerability can lead to arbitrary JavaScript execution in users' browsers, which may result in theft of sensitive information such as cookies or session tokens, unauthorized actions performed on behalf of users, or distribution of malware. This can compromise user accounts and the security of the affected web application.