VYPR
Low severity3.5NVD Advisory· Published Jul 14, 2025· Updated Apr 29, 2026

CVE-2025-7569

CVE-2025-7569

Description

A vulnerability was found in Bigotry OneBase up to 1.3.6. It has been declared as problematic. Affected by this vulnerability is the function parse_args of the file /tpl/think_exception.tpl. The manipulation of the argument args leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

OneBase up to v1.3.6 contains a reflected XSS in the exception handler template (think_exception.tpl) due to unsanitized parse_args() output, enabling remote attacks.

CVE-2025-7569: Reflected XSS in OneBase

A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Bigotry OneBase versions up to 1.3.6. The flaw resides in the exception handling template file /tpl/think_exception.tpl, specifically within the parse_args function. This function does not properly sanitize user-controlled input that is included in the Call Stack debug output, allowing the injection of arbitrary HTML and JavaScript [1].

The vulnerability can be triggered remotely by crafting a request that causes an exception (e.g., by providing invalid input to admin.php/config/configlist/order_field/). The framework then renders a debug page containing the unsanitized user input from the Call Stack, leading to reflected XSS. No authentication is required to trigger the exception, though the attack surface is limited to the admin panel endpoints [1].

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of an administrator's browser. This could lead to session hijacking by stealing cookies or tokens, privilege escalation by modifying admin settings, or phishing attacks through injected login forms [1].

As of the publication date, the vendor has not responded to disclosure, and no official patch is available. However, the vulnerability is specific to debug mode; disabling debug mode or upgrading to a version after 1.3.6 (if made available) should mitigate the risk. The exploit has been publicly disclosed and may be incorporated into automated tools [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.