Vulnerability Description
PiranhaCMS 12.0 allows stored XSS in the Text content block of Standard and Standard Archive Pages via /manager/pages, enabling execution of arbitrary JavaScript in another user s browser.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dotnetfoundation | Piranha Cms | 12.0 |
Related Weaknesses (CWE)
References
- https://github.com/PiranhaCMS/piranha.core/releases/tag/v12.0Release Notes
- https://github.com/Saconyfx/security-advisories/blob/main/CVE-2025-57692/advisorExploitThird Party Advisory
FAQ
What is CVE-2025-57692?
CVE-2025-57692 is a vulnerability with a CVSS score of 6.8 (MEDIUM). PiranhaCMS 12.0 allows stored XSS in the Text content block of Standard and Standard Archive Pages via /manager/pages, enabling execution of arbitrary JavaScript in another user s browser.
How severe is CVE-2025-57692?
CVE-2025-57692 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-57692?
Check the references section above for vendor advisories and patch information. Affected products include: Dotnetfoundation Piranha Cms.