First published: Mon May 05 2025(Updated: )
A vulnerability classified as problematic was found in SeaCMS 13.2. This vulnerability affects unknown code of the file /admin_paylog.php. The manipulation of the argument cstatus leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tina Tinacms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4256 is classified as problematic due to its potential for cross-site scripting attacks.
To fix CVE-2025-4256, ensure that input validation and output encoding are implemented in the /admin_paylog.php file.
CVE-2025-4256 affects SeaCMS version 13.2.
Yes, CVE-2025-4256 can be exploited remotely, allowing attackers to manipulate the cstatus argument.
CVE-2025-4256 is a cross-site scripting vulnerability.