CVE-2025-60837
Description
A reflected cross-site scripting (XSS) vulnerability in MCMS v6.0.1 allows attackers to execute arbitrary Javascript in the context of a user's browser via a crafted payload.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reflected XSS vulnerability in MCMS v6.0.1 allows unauthenticated attackers to execute arbitrary JavaScript via a crafted payload in the search functionality.
Vulnerability
Description
CVE-2025-60837 is a reflected cross-site scripting (XSS) vulnerability in MCMS v6.0.1, a Java-based content management system. The flaw resides in the search functionality, specifically the /mcms/search.do endpoint, which fails to properly sanitize user-supplied input before reflecting it in the response. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim's browser [1][2][3].
Exploitation
The vulnerability can be exploited without authentication, making it accessible to any remote attacker. An attacker can craft a POST request to /mcms/search.do containing a malicious payload, such as ``. The payload is reflected back in the page and executed when the victim visits the crafted URL or submits the malicious form. The vulnerability also exhibits bypass techniques, allowing attackers to evade common XSS filters [3].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the user's browser, potentially leading to session hijacking, defacement of pages, redirection to malicious sites, or extraction of sensitive information such as cookies or CSRF tokens. Since MCMS is often used for content management, a successful attack could compromise the integrity of the website and its users.
Mitigation
As of the publication date, no official patch has been released for MCMS v6.0.1. Users are advised to limit access to the search functionality, implement web application firewall (WAF) rules to block reflected XSS patterns, or apply input validation and output encoding manually until a patch is provided [1][2][4].
- GitHub - ming-soft/MCMS: 完整开源!Java快速开发平台!基于Spring、SpringMVC、Mybatis架构,MStore提供更多好用的插件与模板(文章、商城、微信、论坛、会员、评论、支付、积分、工作流、任务调度等,同时提供上百套免费模板任意选择),价值源自分享!铭飞系统不仅一套简单好用的开源系统、更是一整套优质的开源生态内容体系。铭飞的使命就是降低开发成本提高开发效率,提供全方位的�…
- NVD - CVE-2025-60837
- CVE-2025-60837
- 铭飞/MCMS: 🌈🌈🌈 免费可商用Java开源CMS系统,SpringBoot2/3快速开发业务系统,Vue3、element plus、国产化、信创、等保,定期收集issues问题并更新版本,提供上百套模板与多款实用的插件,提供代码生成器、皮肤设计器方便快速开发业务
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
net.mingsoft:ms-mcmsMaven | <= 6.0.1 | — |
Affected products
2- MCMS/MCMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.