Vulnerability Description
Client-side template injection (CSTI) in Azuriom CMS admin dashboard allows a low-privilege user to execute arbitrary template code in the context of an administrator's session. This can occur via plugins or dashboard components that render untrusted user input, potentially enabling privilege escalation to an administrative account. Fixed in Azuriom 1.2.7.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Azuriom | Azuriom | < 1.2.7 |
Related Weaknesses (CWE)
References
- https://github.com/1337Skid/CVE-2025-65271Third Party Advisory
- https://github.com/Azuriom/AzuriomProduct
- https://github.com/Azuriom/Azuriom/commit/0289175547319add814dcb526e8ba034f1ebc3Patch
- https://www.github.com/Azuriom/AzuriomProduct
- https://www.github.com/Azuriom/Azuriom/commit/0289175547319add814dcb526e8ba034f1Patch
- https://github.com/1337Skid/CVE-2025-65271Third Party Advisory
FAQ
What is CVE-2025-65271?
CVE-2025-65271 is a vulnerability with a CVSS score of 8.8 (HIGH). Client-side template injection (CSTI) in Azuriom CMS admin dashboard allows a low-privilege user to execute arbitrary template code in the context of an administrator's session. This can occur via plu...
How severe is CVE-2025-65271?
CVE-2025-65271 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65271?
Check the references section above for vendor advisories and patch information. Affected products include: Azuriom Azuriom.