newbee-mall, Cross-Site Scripting (XSS), CVE-2025-1114 (Medium)

Listen to this Post

How the CVE Works:

CVE-2025-1114 is a stored XSS vulnerability in newbee-mall 1.0 affecting the `/admin/categories/save` endpoint. The `categoryName` parameter lacks input sanitization, allowing attackers to inject malicious JavaScript payloads. When an admin views the manipulated category, the script executes in their browser, potentially leading to session hijacking or unauthorized actions. The attack is remote, requiring only low-privilege access (PR:L). The CVSS 4.0 vector (AV:N/AC:L/UI:P) confirms network-based exploitation with low complexity.

DailyCVE Form:

Platform: newbee-mall
Version: 1.0
Vulnerability: Stored XSS
Severity: Medium
Date: 06/20/2025

Prediction: Patch by 08/2025

What Undercode Say:

curl -X POST -d "categoryName=<script>alert('XSS')</script>" http://target/admin/categories/save
payload = "<img src=x onerror=stealCookies()>"
requests.post(target_url, data={"categoryName": payload})

How Exploit:

1. Craft malicious `categoryName` payload.

2. Submit via `/admin/categories/save`.

3. Admin triggers execution on page load.

Protection from this CVE:

  • Input sanitization (HTML/JS escaping).
  • CSP headers enforcement.
  • Admin session hardening.

Impact:

  • Session hijacking.
  • Admin privilege escalation.
  • Data exfiltration.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top