CVE-2025-12518
Received Received - Intake
Stored XSS in beefree.io SDK Email Builder Social Icon URL

Publication date: 2026-03-18

Last updated on: 2026-03-18

Assigner: CERT.PL

Description
beefree.io SDK is vulnerable to Stored XSS in Social Media icon URL parameter in email builder functionality. Malicious attacker can inject arbitrary HTML and JS into template, which will be rendered/executed when visiting preview page. However due to beefree's Content Security Policy not all payloads will execute successfully. This issue has been fixed in version 3.47.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-18
Last Modified
2026-03-18
Generated
2026-05-07
AI Q&A
2026-03-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
bee_content_design beefree_sdk 3.47.0
bee_content_design beefree_sdk to 3.47.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-12518 is a Stored Cross-site Scripting (XSS) vulnerability in the beefree.io SDK, specifically in the email builder functionality. The issue lies in the Social Media icon URL parameter, where an attacker can inject arbitrary HTML and JavaScript code into the email template.

When a user visits the preview page of the email template, the injected malicious code is rendered and executed. Although beefree.io implements a Content Security Policy (CSP) that limits some payloads from executing, the vulnerability still allows some malicious scripts to run.

This vulnerability affects all versions of the beefree SDK prior to version 3.47.0, where it has been fixed.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to inject and execute malicious scripts within the email templates you build using the beefree.io SDK.

Such malicious scripts can lead to unauthorized actions such as stealing user data, session hijacking, or delivering malware when users preview the affected email templates.

Even though the Content Security Policy reduces the risk by blocking some payloads, the vulnerability still poses a significant security risk until the SDK is updated to version 3.47.0 or later.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

The vulnerability in the beefree.io SDK has been fixed in version 3.47.0.

To mitigate this vulnerability, you should immediately upgrade your beefree.io SDK to version 3.47.0 or later.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart