CVE-2025-65956
BaseFortify
Publication date: 2025-11-26
Last updated on: 2025-12-03
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| formwork_project | formwork | to 2.2.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stored cross-site scripting (XSS) issue in the Formwork CMS prior to version 2.2.0. It occurs when unsanitized data is inserted into the blog tag field, allowing attacker-controlled scripts to be stored and executed in the browsers of users with CMS credentials who access or edit the affected blog post. This affects privileged administrative workflows and is persistent until patched in version 2.2.0.
How can this vulnerability impact me? :
The vulnerability can lead to attacker-controlled scripts executing in the browsers of users with CMS credentials, potentially allowing attackers to hijack user sessions, steal sensitive information, or perform unauthorized actions within the CMS. Since it affects privileged administrative workflows, it can compromise the integrity and security of the CMS and its content.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Formwork CMS to version 2.2.0 or later, as this version contains the patch that fixes the stored cross-site scripting (XSS) vulnerability. Additionally, restrict access to the CMS to trusted users only and ensure that users with credentials are aware of the risk of executing attacker-controlled scripts when accessing or editing affected blog posts.