CVE-2025-15149
Description
A vulnerability has been found in rawchen ecms up to b59d7feaa9094234e8aa6c8c6b290621ca575ded. Affected by this vulnerability is the function updateProductServlet of the file src/servlet/product/updateProductServlet.java of the component Add New Product Page. The manipulation of the argument productName leads to cross site scripting. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in ecms updateProductServlet allows attackers to inject arbitrary JavaScript via the productName parameter.
Vulnerability
Overview
A stored cross-site scripting (XSS) vulnerability has been identified in the rawchen ecms project, affecting versions up to commit b59d7feaa9094234e8aa6c8c6b290621ca575ded. The flaw resides in the updateProductServlet Java class, specifically within the src/servlet/product/updateProductServlet.java file. The application fails to sanitize the productName parameter before storing it in the database, allowing an attacker to inject arbitrary JavaScript code [1].
Exploitation
An attacker can exploit this vulnerability by submitting a crafted product name containing malicious script, such as ``, via the Add New Product Page. The attack is remote and does not require authentication, as the product update interface is accessible without special privileges. The injected script is stored in the database and executed when any user views the affected product listing, making it a stored XSS attack [1].
Impact
Successful exploitation enables an attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The CVSS v3 score is 2.4 (Low), reflecting the need for user interaction and the limited direct impact on confidentiality, integrity, and availability in typical deployments.
Mitigation
As of the disclosure date, the vendor has not responded to reports, and no official patch has been released. The project follows a rolling release model, so users should monitor for updates or manually sanitize the productName input in the updateProductServlet code. No workaround is provided by the vendor [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.