Home

Description

Masa CMS is an open source Enterprise Content Management platform. Versions 7.2.8 and below, 7.3.1 through 7.3.13, 7.4.0-alpha.1 through 7.4.8 and 7.5.0 through 7.5.1 are vulnerable to XSS when an unsanitized value of the ajax URL query parameter is directly included within the <head> section of the HTML page. An attacker can execute arbitrary scripts in the context of the user's session, potentially leading to Session Hijacking, Data Theft, Defacement and Malware Distribution. This issue is fixed in versions 7.5.2, 7.4.9, 7.3.14, and 7.2.9. To work around this issue, configure a Web Application Firewall (WAF) rule (e.g., ModSecurity) to block requests containing common XSS payload characters in the ajax query parameter. Alternatively, implement server-side sanitization using middleware to strip or escape dangerous characters from the ajax parameter before it reaches the vulnerable rendering logic.

PUBLISHED Reserved 2025-12-02 | Published 2025-12-12 | Updated 2025-12-18 | Assigner GitHub_M




HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 7.2.9
affected

>= 7.3.1, < 7.3.14
affected

>= 7.4.0-alpha.1, < 7.4.8
affected

>= 7.5.0, < 7.5.2
affected

References

github.com/...asaCMS/security/advisories/GHSA-249c-vqwv-43vc

github.com/...ommit/376c27196b1e2489888b7a000cdf5c45bb85959e

cve.org (CVE-2025-66492)

nvd.nist.gov (CVE-2025-66492)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.