Vulnerability Report: CVE-2025-64048 - YCCMS 3.4 Stored Cross-Site Scripting (XSS) Vulnerability Summary YCCMS version 3.4 contains a stored cross-site scripting (XSS) vulnerability in the article management functionality. The vulnerability exists in the and functions within the file due to improper neutralization of user input in the article title field. Affected Product Vendor: The development group Product: YCCMS Version: 3.4 Vulnerable Component: Vulnerable Functions: , Vulnerability Details Vulnerability Type: Stored Cross-Site Scripting (XSS) Attack Type: Remote Privileges Required: Authenticated user (backend access) Attack Vectors: - Authenticated attackers can inject arbitrary web script or HTML via the title parameter - Payload is stored in the database and executed when visitors view articles - Persistent attack requiring no user interaction for execution Impact: Information Disclosure, Session Hijacking Technical Description The vulnerability exists due to insufficient input sanitization in the article management module of YCCMS 3.4. The and functions in fail to properly sanitize user-supplied input in the article title field before storing it in the database and displaying it to users. Attack Scenario An authenticated attacker with access to the backend management system can create or edit an article with a malicious XSS payload in the title field. The payload is permanently stored in the database and automatically executes when any user visits the affected article page, leading to: Theft of session cookies and authentication tokens Unauthorized actions on behalf of authenticated users Defacement of website content Client-side malware distribution Key Characteristics Stored XSS: Payload persists in the database Backend Access Required: Attacker needs article management privileges Automatic Execution: No user interaction needed beyond viewing the article Wide Impact: Affects all users viewing the compromised article Remediation Recommendations Implement strict input validation for all user-supplied data Apply proper output encoding when displaying user-controlled content Use Content Security Policy (CSP) headers Sanitize data before database storage and before output rendering References Vendor Website: http://yccms.com Discoverer b1uel0n3 CVE Identifier CVE-2025-64048