Featured image of post CVE-2025-9823

CVE-2025-9823

Cross-Site Scripting (XSS) Reflected

CVE-2025-9823: Cross-Site Scripting (XSS) Reflected in endpoint /s/ajax?action=lead:addLeadTags parameter Tags

CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-9823

Summary

A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the search_autocomplete endpoint of the Mautic application. This vulnerability allows attackers to inject malicious scripts into the Tags parameter.

Details

Vulnerable Endpoint: /s/ajax?action=lead:addLeadTags

Parameter: Tags

The application reflects this input directly in the response. Although the server applies sanitization before storing the data or returning it later, the payload is executed immediately in the victim’s browser upon reflection, allowing an attacker to run arbitrary JavaScript in the user’s session.

PoC

Payload:

1
"><script>alert('XSS')</script>

Impact

  • Stealing session cookies: Attackers can use stolen session cookies to hijack a user's session and perform actions on their behalf.
  • Downloading malware: Attackers can trick users into downloading and installing malware on their computers.
  • Hijacking browsers: Attackers can hijack a user's browser or deliver browser-based exploits.
  • Stealing credentials: Attackers can steal a user's credentials.
  • Obtaining sensitive information: Attackers can obtain sensitive information stored in a user's account or in their browser.
  • Defacing websites: Attackers can deface a website by altering its content.
  • Misdirecting users: Attackers can change the instructions given to users who visit the target website, misdirecting their behavior.
  • Damaging a business's reputation: Attackers can damage a business's image or spread misinformation by defacing a corporate website.

Reference

https://github.com/mautic/mautic/security/advisories/GHSA-9v8p-m85m-f7mm

Finder

Natan Maia Morette

By: CVE-Hunters

Built with Hugo
Theme Stack designed by Jimmy