Vulnerability Description
A vulnerability classified as problematic was found in SeaCMS 13.2. This vulnerability affects unknown code of the file /admin_paylog.php. The manipulation of the argument cstatus leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Seacms | Seacms | 13.2 |
Related Weaknesses (CWE)
References
- https://github.com/seacms-net/CMS/issues/25ExploitIssue Tracking
- https://github.com/seacms-net/CMS/issues/25#issue-3007083568ExploitIssue Tracking
- https://vuldb.com/?ctiid.307360Permissions RequiredVDB Entry
- https://vuldb.com/?id.307360Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.562718Third Party AdvisoryVDB Entry
- https://github.com/seacms-net/CMS/issues/25ExploitIssue Tracking
FAQ
What is CVE-2025-4256?
CVE-2025-4256 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability classified as problematic was found in SeaCMS 13.2. This vulnerability affects unknown code of the file /admin_paylog.php. The manipulation of the argument cstatus leads to cross site ...
How severe is CVE-2025-4256?
CVE-2025-4256 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-4256?
Check the references section above for vendor advisories and patch information. Affected products include: Seacms Seacms.