Submit #661874: Guizhou Qianhu Technology Co., Ltd. FoxCMS ≤ v1.2 Reflected Cross-Site Scripting (Reflected XSS, CWE-79)info

TitleGuizhou Qianhu Technology Co., Ltd. FoxCMS ≤ v1.2 Reflected Cross-Site Scripting (Reflected XSS, CWE-79)
DescriptionA reflected cross-site scripting (XSS) vulnerability exists in FoxCMS (≤ v1.2) in the Search page. The keyword parameter is echoed back to the page without proper context-sensitive encoding, allowing an attacker to inject JavaScript. Proof-of-concept (example): GET /index.php/Search?fields=title&kwtype=1&keyword=321"%20onmouseover="alert(document.cookie); When a victim opens the crafted URL, the injected script executes (demonstrable via alert(1) or alert(document.cookie)). Impact: an attacker can execute arbitrary JavaScript in the victim’s browser, potentially stealing non-HttpOnly cookies, performing phishing, CSRF chaining, or conducting actions on behalf of the user. Mitigation: perform context-aware output encoding when rendering keyword (e.g. HTML-attribute encoding), enforce input validation/length limits, and set sensitive cookies with HttpOnly; Secure; SameSite. Deploy a strict Content Security Policy (CSP) as an additional defense. Suggested severity: Medium (escalate to High if session identifiers are stored in readable cookies).
Source⚠️ https://github.com/coolcj-stack/FoxCMS-V1.2-is-vulnerable-to-cross-site-scripting-attacks.-There-is-an-XSS-vulnerability
User
 BlackSpdier (UID 89912)
Submission09/24/2025 16:02 (7 months ago)
Moderation10/04/2025 20:57 (10 days later)
StatusAccepted
VulDB entry327187 [qianfox FoxCMS up to 1.2 Search Page /index.php/Search keyword cross site scripting]
Points20

Interested in the pricing of exploits?

See the underground prices here!