Formwork is a flat file-based Content Management System (CMS). Prior to version 2.2.0, inserting unsanitized data into the blog tag field results in stored cross‑site scripting (XSS). Any user with credentials to the Formwork CMS who accesses or edits an affected blog post will have attacker‑controlled script executed in their browser. The issue is persistent and impacts privileged administrative workflows. This issue has been patched in version 2.2.0.
References
| Link | Resource |
|---|---|
| https://github.com/getformwork/formwork/commit/4abcd60ae7692b46d316f956b0b20fb85336f3b2 | Patch |
| https://github.com/getformwork/formwork/pull/791 | Issue Tracking Patch |
| https://github.com/getformwork/formwork/security/advisories/GHSA-7j46-f57w-76pj | Exploit Third Party Advisory |
| https://github.com/getformwork/formwork/security/advisories/GHSA-7j46-f57w-76pj | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-11-26 00:15
Updated : 2025-12-03 20:30
NVD link : CVE-2025-65956
Mitre link : CVE-2025-65956
CVE.ORG link : CVE-2025-65956
JSON object : View
Products Affected
formwork_project
- formwork
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
