{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14013","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-04T11:27:24.658Z","datePublished":"2025-12-04T18:02:05.659Z","dateUpdated":"2026-02-24T05:40:39.287Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T05:40:39.287Z"},"title":"JIZHICMS Comment addcomment.html cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"n/a","product":"JIZHICMS","versions":[{"version":"2.5.0","status":"affected"},{"version":"2.5.1","status":"affected"},{"version":"2.5.2","status":"affected"},{"version":"2.5.3","status":"affected"},{"version":"2.5.4","status":"affected"},{"version":"2.5.5","status":"affected"}],"cpes":["cpe:2.3:a:jizhicms:jizhicms:*:*:*:*:*:*:*:*"],"modules":["Comment Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in JIZHICMS up to 2.5.5. The impacted element is an unknown function of the file /index.php/admins/Comment/addcomment.html of the component Comment Handler. The manipulation of the argument body leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":2.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-04T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-11T02:18:46.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"nobb (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.334254","name":"VDB-334254 | JIZHICMS Comment addcomment.html cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.334254","name":"VDB-334254 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.694649","name":"Submit #694649 | Langfang Extreme Network Technology Co., Ltd jizhicms <=2.5.5 Storage XSS","tags":["third-party-advisory"]},{"url":"https://github.com/24-2021/vul2/blob/main/jizhicms%3DV2.5.5-Commentaddcomment.html-bodyparameter-Storage%20XSS/jizhicms%3DV2.5.5-Commentaddcomment.html-bodyparameter-Storage%20XSS.md","tags":["broken-link","exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-05T19:19:00.801963Z","id":"CVE-2025-14013","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-05T19:19:15.823Z"}}]}}