{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-2491","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-03-18T09:19:55.388Z","datePublished":"2025-03-18T14:31:03.965Z","dateUpdated":"2025-03-18T14:54:02.247Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-18T14:31:03.965Z"},"title":"Dromara ujcms Edit Template File Page WebFileTemplateController.java update cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"Dromara","product":"ujcms","versions":[{"version":"9.7.5","status":"affected"}],"modules":["Edit Template File Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in Dromara ujcms 9.7.5. This affects the function update of the file /main/java/com/ujcms/cms/ext/web/backendapi/WebFileTemplateController.java of the component Edit Template File Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Es wurde eine Schwachstelle in Dromara ujcms 9.7.5 entdeckt. Sie wurde als problematisch eingestuft. Es geht dabei um die Funktion update der Datei /main/java/com/ujcms/cms/ext/web/backendapi/WebFileTemplateController.java der Komponente Edit Template File Page. Mittels dem Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":2.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N"}}],"timeline":[{"time":"2025-03-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-03-18T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-18T10:25:08.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"icefoxh (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.299997","name":"VDB-299997 | Dromara ujcms Edit Template File Page WebFileTemplateController.java update cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.299997","name":"VDB-299997 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.517269","name":"Submit #517269 | ujcms v9.7.5 stored XSS","tags":["third-party-advisory"]},{"url":"https://github.com/dromara/ujcms/issues/14","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-18T14:53:52.456436Z","id":"CVE-2025-2491","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-18T14:54:02.247Z"}}]}}