VYPR
Low severity2.4NVD Advisory· Published Dec 28, 2025· Updated Apr 29, 2026

CVE-2025-15149

CVE-2025-15149

Description

A vulnerability has been found in rawchen ecms up to b59d7feaa9094234e8aa6c8c6b290621ca575ded. Affected by this vulnerability is the function updateProductServlet of the file src/servlet/product/updateProductServlet.java of the component Add New Product Page. The manipulation of the argument productName leads to cross site scripting. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in ecms updateProductServlet allows attackers to inject arbitrary JavaScript via the productName parameter.

Vulnerability

Overview

A stored cross-site scripting (XSS) vulnerability has been identified in the rawchen ecms project, affecting versions up to commit b59d7feaa9094234e8aa6c8c6b290621ca575ded. The flaw resides in the updateProductServlet Java class, specifically within the src/servlet/product/updateProductServlet.java file. The application fails to sanitize the productName parameter before storing it in the database, allowing an attacker to inject arbitrary JavaScript code [1].

Exploitation

An attacker can exploit this vulnerability by submitting a crafted product name containing malicious script, such as ``, via the Add New Product Page. The attack is remote and does not require authentication, as the product update interface is accessible without special privileges. The injected script is stored in the database and executed when any user views the affected product listing, making it a stored XSS attack [1].

Impact

Successful exploitation enables an attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The CVSS v3 score is 2.4 (Low), reflecting the need for user interaction and the limited direct impact on confidentiality, integrity, and availability in typical deployments.

Mitigation

As of the disclosure date, the vendor has not responded to reports, and no official patch has been released. The project follows a rolling release model, so users should monitor for updates or manually sanitize the productName input in the updateProductServlet code. No workaround is provided by the vendor [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1
  • rawchen/ecmsllm-create
    Range: <= b59d7feaa9094234e8aa6c8c6b290621ca575ded

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.