Plattform
other
Komponente
starsea-mall
Behoben in
1.0.1
A cross-site scripting (XSS) vulnerability has been identified in StarSea-Mall Backend versions 1.0 through 1.0. This flaw allows attackers to inject malicious scripts via manipulation of the categoryName parameter within the /admin/indexConfigs/save endpoint. Successful exploitation could lead to session hijacking or defacement of the administrative interface. A patch is available in version 1.0.1.
The XSS vulnerability in StarSea-Mall Backend allows an attacker to inject arbitrary JavaScript code into the application. This code will then be executed in the context of the user's browser when they access the affected page. An attacker could leverage this to steal session cookies, redirect users to malicious websites, or modify the content displayed on the page. Given the administrative interface is targeted, a successful attack could grant the attacker control over the entire backend system, potentially leading to data breaches, system compromise, and further malicious activity. The lack of versioning makes it difficult to determine the full scope of affected deployments.
This vulnerability has been publicly disclosed, increasing the risk of exploitation. While the CVSS score is LOW (2.4), the potential impact on the administrative interface warrants immediate attention. No known active campaigns or KEV listing have been reported as of the publication date. Public proof-of-concept exploits are likely to emerge given the disclosure.
Organizations utilizing StarSea-Mall Backend in their deployments, particularly those with administrative access exposed through the /admin/indexConfigs/save endpoint, are at risk. Shared hosting environments where multiple users share the same StarSea-Mall Backend instance are also potentially vulnerable.
disclosure
Exploit-Status
EPSS
0.08% (23% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-2352 is to upgrade StarSea-Mall Backend to version 1.0.1, which contains the fix. If upgrading is not immediately feasible, consider implementing input validation and sanitization on the categoryName parameter within the /admin/indexConfigs/save endpoint. Web application firewalls (WAFs) configured to detect and block XSS payloads can also provide a temporary layer of protection. Thoroughly review and sanitize all user-supplied input to prevent further XSS vulnerabilities.
Aktualisieren auf eine gepatchte Version oder die notwendigen Sicherheitsmaßnahmen anwenden, um die Ausführung von unerwünschtem JavaScript-Code zu verhindern. Benutzereingaben validieren und bereinigen, insbesondere den Parameter categoryName, um jeglichen bösartigen Code zu entfernen, bevor er in der Datenbank gespeichert oder in der Benutzeroberfläche angezeigt wird.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-2352 is a cross-site scripting vulnerability in StarSea-Mall Backend versions 1.0–1.0, allowing attackers to inject malicious scripts via the /admin/indexConfigs/save endpoint.
If you are using StarSea-Mall Backend version 1.0–1.0, you are potentially affected by this vulnerability. Upgrade to version 1.0.1 to mitigate the risk.
Upgrade StarSea-Mall Backend to version 1.0.1. As an interim measure, implement input validation and sanitization on the categoryName parameter.
While no active campaigns have been confirmed, the vulnerability has been publicly disclosed, increasing the likelihood of exploitation.
Contact StarSea99 directly for the official advisory regarding CVE-2025-2352.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.