A vulnerability was identified in JIZHICMS up to 2.5.5. The impacted element is an unknown function of the file /index.php/admins/Comment/addcomment.html of the component Comment Handler. The manipulation of the argument body leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/24-2021/vul2/blob/main/jizhicms%3DV2.5.5-Commentaddcomment.html-bodyparameter-Storage%20XSS/jizhicms%3DV2.5.5-Commentaddcomment.html-bodyparameter-Storage%20XSS.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.334254 | Permissions Required VDB Entry |
| https://vuldb.com/?id.334254 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.694649 | Third Party Advisory VDB Entry |
Configurations
History
10 Dec 2025, 21:40
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Jizhicms
Jizhicms jizhicms |
|
| CPE | cpe:2.3:a:jizhicms:jizhicms:*:*:*:*:*:*:*:* | |
| References | () https://github.com/24-2021/vul2/blob/main/jizhicms%3DV2.5.5-Commentaddcomment.html-bodyparameter-Storage%20XSS/jizhicms%3DV2.5.5-Commentaddcomment.html-bodyparameter-Storage%20XSS.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.334254 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.334254 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.694649 - Third Party Advisory, VDB Entry |
04 Dec 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-04 19:16
Updated : 2025-12-10 21:40
NVD link : CVE-2025-14013
Mitre link : CVE-2025-14013
CVE.ORG link : CVE-2025-14013
JSON object : View
Products Affected
jizhicms
- jizhicms
