CVE-2025-69437
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to upload a PDF file that contains malicious JavaScript, which can then execute when a user views the file, potentially stealing credentials or performing unauthorized actions. It affects all file upload points in the system, meaning any user with upload access can exploit this if they upload a specially crafted PDF.
Technical Description
PublicCMS v5.202506.d and earlier is vulnerable to stored XSS. Uploaded PDFs can contain JavaScript payloads and bypass PDF security checks in the backend CmsFileUtils.java. If a user uploads a PDF file containing a malicious payload to the system and views it, the embedded JavaScript payload can be triggered, resulting in issues such as credential theft, arbitrary API execution, and other security concerns. This vulnerability affects all file upload endpoint, including /cmsTemplate/save, /file/doUpload, /cmsTemplate/doUpload, /file/doBatchUpload, /cmsWebFile/doUpload, etc.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 27, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
publiccms
Product
publiccms