A reflected XSS vulnerability exists in CMSimple_XH 1.8's index.php router when attacker-controlled path segments are not sanitized or encoded before being inserted into the generated HTML (navigation links, breadcrumbs, search form action, footer links). An attacker-controlled string placed in the URL path is reflected into multiple HTML elements, allowing execution of arbitrary JavaScript in victims' browsers visiting a crafted URL.
References
| Link | Resource |
|---|---|
| https://github.com/cmsimple-xh/cmsimple-xh/blob/master/index.php | Product |
| https://github.com/cybercrewinc/CVE-2025-63589 | Exploit Third Party Advisory |
| https://github.com/cybercrewinc/CVE-2025-63589 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-11-06 17:15
Updated : 2025-11-10 17:29
NVD link : CVE-2025-63589
Mitre link : CVE-2025-63589
CVE.ORG link : CVE-2025-63589
JSON object : View
Products Affected
cmsimple-xh
- cmsimple_xh
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
