{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-3962","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-04-26T07:03:35.605Z","datePublished":"2025-04-27T07:00:05.736Z","dateUpdated":"2025-04-28T14:25:57.360Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-04-27T07:00:05.736Z"},"title":"withstars Books-Management-System Comment add cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"withstars","product":"Books-Management-System","versions":[{"version":"1.0","status":"affected"}],"modules":["Comment Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic was found in withstars Books-Management-System 1.0. This vulnerability affects unknown code of the file /api/comment/add of the component Comment Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"In withstars Books-Management-System 1.0 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /api/comment/add der Komponente Comment Handler. Durch die Manipulation des Arguments content mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2025-04-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-04-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-04-26T09:08:54.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Caigosec (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.306298","name":"VDB-306298 | withstars Books-Management-System Comment add cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.306298","name":"VDB-306298 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.557236","name":"Submit #557236 | https://github.com/withstars/Blog-System Blog-System 1.0 Stored Cross-Site Scripting","tags":["third-party-advisory"]},{"url":"https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS2.md","tags":["exploit"]}],"tags":["unsupported-when-assigned"]},"adp":[{"references":[{"url":"https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS2.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-28T14:25:37.739070Z","id":"CVE-2025-3962","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-28T14:25:57.360Z"}}]}}