Plateforme
php
Composant
native-php-cms
Corrigé dans
1.0.1
A problematic cross-site scripting (XSS) vulnerability has been identified in native-php-cms versions 1.0. This flaw resides within the /fladmin/jump.php file and allows attackers to inject malicious scripts through manipulation of the 'message/error' argument. The vulnerability is remotely exploitable and has been publicly disclosed. A patch is available in version 1.0.1.
Successful exploitation of CVE-2025-0483 allows an attacker to execute arbitrary JavaScript code within the context of a user's browser session on a system running native-php-cms. This can lead to various malicious outcomes, including session hijacking, defacement of the website, redirection to phishing sites, and theft of sensitive user data such as cookies and login credentials. The impact is amplified if the CMS is used to manage sensitive information or handle financial transactions. The remote nature of the vulnerability means an attacker does not need local access to the system to exploit it.
This vulnerability has been publicly disclosed, increasing the likelihood of exploitation. No known active campaigns targeting CVE-2025-0483 have been reported as of the publication date. The CVSS score of 3.5 (LOW) indicates a relatively low probability of exploitation, but the public disclosure necessitates prompt remediation. The vulnerability was published on 2025-01-15.
Websites and applications utilizing native-php-cms version 1.0 are at risk. This includes small businesses, personal blogs, and any other online platform relying on this CMS. Shared hosting environments are particularly vulnerable as they often have limited control over CMS updates and security configurations.
• php: Examine the /fladmin/jump.php file for unsanitized usage of the 'message/error' parameter. Look for instances where user input is directly outputted to the browser without proper encoding.
• generic web: Monitor web server access logs for requests to /fladmin/jump.php with unusual or suspicious parameters in the 'message/error' field.
• generic web: Use curl to test the endpoint: curl 'http://your-cms-url/fladmin/jump.php?message/error=<script>alert(1)</script>' and observe the response for signs of XSS execution.
disclosure
Statut de l'Exploit
EPSS
0.36% (percentile 58%)
CISA SSVC
Vecteur CVSS
The primary mitigation for CVE-2025-0483 is to immediately upgrade native-php-cms to version 1.0.1 or later, which contains the fix. If upgrading is not immediately feasible, consider implementing input validation and output encoding on the 'message/error' parameter in /fladmin/jump.php to sanitize user-supplied data. Web application firewalls (WAFs) configured to detect and block XSS payloads targeting this specific file and parameter can provide an additional layer of defense. Review access logs for suspicious activity related to /fladmin/jump.php.
Actualizar a una versión parcheada o aplicar una solución para evitar la inyección de código XSS en el parámetro message/error del archivo jump.php. Escapar o validar las entradas del usuario es crucial para prevenir este tipo de vulnerabilidades. Si no hay parche disponible, considere deshabilitar o eliminar el componente afectado.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2025-0483 is a cross-site scripting vulnerability in native-php-cms version 1.0 affecting the /fladmin/jump.php file. Attackers can inject malicious scripts via the 'message/error' parameter.
Yes, if you are running native-php-cms version 1.0, you are vulnerable. Upgrade to version 1.0.1 or later to mitigate the risk.
Upgrade native-php-cms to version 1.0.1 or later. As a temporary workaround, implement input validation and output encoding on the 'message/error' parameter.
While no active campaigns have been confirmed, the vulnerability has been publicly disclosed, increasing the risk of exploitation. Prompt remediation is recommended.
Refer to the native-php-cms project's official website or repository for the latest security advisories and updates related to CVE-2025-0483.
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.