# Typesetter CMS Editing.php 反射型XSS漏洞
## 概述
Typesetter CMS 在版本 5.1 及之前存在反射型跨站脚本(XSS)漏洞,位于编辑组件中。
## 影响版本
版本 5.1 及以下。
## 细节
漏洞存在于 `include/tool/Editing.php` 文件中。当处理 POST 请求中的 `images[]` 参数时,未对 `images` 参数进行上下文敏感的输出编码,直接将其反射到 HTML 的 href 属性中。
## 影响
经过身份验证且具有编辑权限的攻击者可提交包含 JavaScript 伪协议(如 `javascript:`)的参数,导致在受害者浏览器会话上下文中执行任意 JavaScript 代码。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Reflected XSS in Editing.php · Issue #706 · Typesetter/Typesetter -- 🔗来源链接
标签:issue-tracking
神龙速读:
### 漏洞关键信息
- **漏洞类型**: Reflected XSS
- **文件**: include/tool/Editing.php
- **参数**: `images`
#### Details
- The `images` parameter is output to the page without being properly processed.
- `images` parameter is used in the `href` attribute and can be attacked through JavaScript pseudo-protocol.
#### PoC
```plaintext
POST
images[]=javascript:alert(1)
```
#### Impact
- XSS vulnerabilities allow attackers to execute malicious scripts in users' browsers, enabling unauthorized access to sensitive data, session hijacking, or malware distribution.
标题: Typesetter CMS Reflected XSS via Editing.php | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
```md
# Typesetter CMS Reflected XSS via Editing.php
## Severity
- Medium
## Date
- January 14, 2026
## Affecting
- Typesetter <= 5.1
- This project appears to no longer be maintained
## CVE
- CVE-2025-71164
## CWE
- CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
## CVSS Score
- 4.6/CVSS:3.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
## References
- [Typesetter GitHub Issue](#)
## Credit
- Snow1nd, Beatriz Fresno Naumova
## Description
Typesetter CMS versions up to and including 5.1 contain a reflected cross-site scripting (XSS) vulnerability in the Editing component. The `images` parameter (submitted as `images[]` in a POST request) is reflected into an HTML `href` attribute without proper context-aware output encoding in `include/tool/Editing.php`. An authenticated attacker with editing privileges can supply a JavaScript pseudo-protocol (e.g., `javascript:`) to trigger arbitrary JavaScript execution in the context of the victim's browser session.
```
标题: GitHub - Typesetter/Typesetter: Open source CMS written in PHP focused on ease of use with true WYSIWYG editing and flat-file storage. -- 🔗来源链接
标签:product
神龙速读:
### 关键信息
#### 项目概述
- **Type**: 开源CMS
- **语言**: PHP (71.6%)、SCSS (18.2%)、JavaScript (5.5%)
- **功能**: WYSIWYG编辑、扁平文件存储
#### 安全与维护
- **仓库星级**: 231星星
- **关注者数量**: 33位关注者
- **Forks数量**: 99份分支
#### 重要特性
- 基于PHP的开源内容管理系统
- 支持多种语言和库,如Bootstrap和SCSS
- 提供WYSIWYG编辑和扁平文件存储功能
- 下载页面、官方文档、论坛和Wiki等资源链接
#### 开发与贡献
- 贡献指南提供了详尽的命令行和UI操作流程
- 可通过GitHub提交漏洞修复与功能增强建议
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.