DaiCuo, Cross-Site Scripting (XSS), CVE-2025-3795 (Medium)

Listen to this Post

How the CVE Works:

CVE-2025-3795 is a stored XSS vulnerability in DaiCuo 1.3.13’s SEO Optimization Settings section. Attackers inject malicious JavaScript via crafted input fields, which executes when administrators view the settings. The flaw arises from improper sanitization of user-supplied data, allowing persistent script execution. Remote exploitation requires admin-level access (PR:H), limiting attack scope but enabling privilege escalation or session hijacking if abused.

DailyCVE Form:

Platform: DaiCuo
Version: 1.3.13
Vulnerability: Stored XSS
Severity: Medium
Date: 06/23/2025

Prediction: Patch by 08/2025

What Undercode Say:

Analytics:

curl -X GET "http://example.com/api/seo_settings" -H "Cookie: admin_session=123"
payload = "<script>alert('XSS')</script>"
requests.post("/admin/seo", data={"": payload})

How Exploit:

1. Authenticate as admin.

2. Inject malicious script into SEO fields.

3. Trigger execution via admin panel load.

Protection from this CVE:

  • Sanitize SEO input fields.
  • Implement CSP headers.
  • Update to patched version.

Impact:

  • Session hijacking.
  • Admin privilege abuse.
  • Data exfiltration.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top