<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Reflected-Xss — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/reflected-xss/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 09:15:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/reflected-xss/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tegsoft Online Support Application Reflected XSS Vulnerability (CVE-2025-14320)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tegsoft-xss/</link><pubDate>Mon, 04 May 2026 09:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tegsoft-xss/</guid><description>CVE-2025-14320 is a reflected cross-site scripting (XSS) vulnerability in Tegsoft Online Support Application versions V3 through 31122025, allowing attackers to inject arbitrary web scripts into user browsers.</description><content:encoded><![CDATA[<p>A reflected cross-site scripting (XSS) vulnerability, identified as CVE-2025-14320, exists within the Tegsoft Management and Information Services Trade Limited Company Online Support Application. This vulnerability affects versions V3 through 31122025. An attacker can exploit this vulnerability by injecting malicious scripts into a web page, which is then reflected back to the user, leading to potential data theft, session hijacking, or website defacement. This vulnerability was reported by the Computer Emergency Response Team of the Republic of Turkey. Successful exploitation requires tricking a user into clicking a specially crafted link.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious URL containing a JavaScript payload.</li>
<li>The attacker distributes the crafted URL via email, social media, or other means.</li>
<li>Unsuspecting user clicks the malicious URL.</li>
<li>The user&rsquo;s browser sends a request to the vulnerable Tegsoft Online Support Application with the malicious script as a parameter.</li>
<li>The Tegsoft application fails to properly sanitize the input.</li>
<li>The application reflects the malicious script back to the user&rsquo;s browser within the HTML response.</li>
<li>The user&rsquo;s browser executes the malicious script.</li>
<li>The script can then perform actions such as stealing cookies, redirecting the user to a phishing site, or defacing the web page.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this reflected XSS vulnerability can lead to the execution of arbitrary JavaScript code in the context of the victim&rsquo;s browser. This can result in session hijacking, where an attacker gains unauthorized access to the user&rsquo;s account. It can also lead to data theft, where sensitive information is stolen from the user&rsquo;s browser. Furthermore, the attacker can redirect the user to a phishing website or deface the Online Support Application, potentially impacting multiple users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates from Tegsoft to address CVE-2025-14320 on the Online Support Application.</li>
<li>Implement proper input validation and output encoding to prevent XSS vulnerabilities in the application based on CWE-79.</li>
<li>Deploy the provided Sigma rule to detect potential XSS attempts in web server logs.</li>
<li>Educate users about the dangers of clicking on suspicious links to mitigate the initial access vector.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>reflected-xss</category><category>cve-2025-14320</category></item><item><title>Adobe Connect Reflected XSS Vulnerability (CVE-2026-27245)</title><link>https://feed.craftedsignal.io/briefs/2024-02-adobe-connect-xss/</link><pubDate>Tue, 14 Apr 2026 18:16:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-adobe-connect-xss/</guid><description>Adobe Connect versions 2025.3, 12.10, and earlier are vulnerable to a reflected Cross-Site Scripting (XSS) attack, enabling attackers to execute malicious JavaScript in a victim's browser by enticing them to visit a crafted URL.</description><content:encoded><![CDATA[<p>A reflected Cross-Site Scripting (XSS) vulnerability, identified as CVE-2026-27245, affects Adobe Connect versions 2025.3, 12.10, and earlier. This vulnerability allows an attacker to inject malicious JavaScript code into a user&rsquo;s browser by convincing them to click on a specially crafted URL. When the victim visits the malicious URL, the injected script executes within their browser session, potentially enabling the attacker to steal cookies, redirect the user to a malicious website, or deface the web page. This vulnerability poses a significant risk to Adobe Connect users, as it can lead to account compromise and data breaches. Exploitation requires user interaction, but the impact can be severe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious URL containing a JavaScript payload within a parameter.</li>
<li>The attacker distributes the crafted URL via email, social media, or other means to a targeted user.</li>
<li>The victim clicks on the malicious link, unknowingly initiating the XSS attack.</li>
<li>The user&rsquo;s browser sends a request to the Adobe Connect server with the malicious JavaScript in the URL.</li>
<li>The Adobe Connect server reflects the malicious JavaScript code back to the user&rsquo;s browser without proper sanitization.</li>
<li>The victim&rsquo;s browser executes the reflected JavaScript code within the context of the Adobe Connect application.</li>
<li>The attacker can then steal the victim&rsquo;s session cookies.</li>
<li>Using the stolen cookies, the attacker can hijack the victim&rsquo;s session, gaining unauthorized access to their Adobe Connect account and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this reflected XSS vulnerability (CVE-2026-27245) in Adobe Connect could lead to unauthorized access to user accounts, sensitive data, and the Adobe Connect environment. An attacker could potentially deface web pages, redirect users to phishing sites, or inject malware. The impact ranges from user-specific data theft to wider compromise of the Adobe Connect platform. While the number of victims is unknown, any organization using the affected Adobe Connect versions is vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Adobe Connect that addresses CVE-2026-27245. Refer to the vendor advisory at <a href="https://helpx.adobe.com/security/products/connect/apsb26-37.html">https://helpx.adobe.com/security/products/connect/apsb26-37.html</a> for specific upgrade instructions.</li>
<li>Deploy the Sigma rule <code>Detect Adobe Connect XSS Attempt via URI</code> to identify requests containing suspicious JavaScript payloads targeting Adobe Connect.</li>
<li>Educate users to be cautious about clicking on URLs received from untrusted sources to mitigate the initial access vector.</li>
<li>Monitor web server logs for unusual URI patterns and JavaScript-like syntax using the <code>Detect Reflected XSS Payloads in URI</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>adobe-connect</category><category>cve-2026-27245</category><category>reflected-xss</category></item><item><title>Zootemplate Cerato Theme Reflected XSS Vulnerability (CVE-2025-58920)</title><link>https://feed.craftedsignal.io/briefs/2024-01-cerato-xss/</link><pubDate>Fri, 10 Apr 2026 14:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cerato-xss/</guid><description>A reflected cross-site scripting (XSS) vulnerability exists in the Zootemplate Cerato WordPress theme (versions n/a through 2.2.18) due to improper neutralization of user-supplied input, potentially allowing attackers to execute arbitrary JavaScript in a user's browser.</description><content:encoded><![CDATA[<p>A reflected XSS vulnerability, identified as CVE-2025-58920, affects the Zootemplate Cerato WordPress theme. The vulnerability resides in versions ranging from n/a through 2.2.18. It stems from the improper neutralization of input during web page generation, which can allow an attacker to inject malicious scripts into a web page viewed by other users. Successful exploitation could allow an attacker to steal cookies, redirect users to malicious websites, or deface web pages. Given the widespread use of WordPress and its themes, this vulnerability poses a risk to websites using the affected Cerato theme.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable endpoint within the Cerato theme that does not properly sanitize user input.</li>
<li>The attacker crafts a malicious URL containing a JavaScript payload within a parameter.</li>
<li>The attacker distributes the malicious URL via email, social media, or other means.</li>
<li>A victim clicks the malicious URL, sending a request to the vulnerable WordPress site.</li>
<li>The WordPress server, using the Cerato theme, reflects the attacker&rsquo;s JavaScript payload in the response without proper sanitization.</li>
<li>The victim&rsquo;s browser executes the malicious JavaScript code.</li>
<li>The attacker gains the ability to perform actions on behalf of the victim, such as stealing cookies or redirecting the user.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this reflected XSS vulnerability can lead to several adverse effects. An attacker could steal a user&rsquo;s session cookies, gaining unauthorized access to their account. Victims can be redirected to phishing sites, potentially compromising their credentials. Further, attackers might inject malicious content into the web page, defacing the site or spreading malware. The impact of this vulnerability is limited by the need for user interaction (clicking a malicious link), but the potential for widespread exploitation remains significant for sites using the vulnerable Cerato theme.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Zootemplate Cerato WordPress theme to a version beyond 2.2.18 to remediate CVE-2025-58920.</li>
<li>Deploy the Sigma rule to detect exploitation attempts against this vulnerability (see the &ldquo;Reflected XSS Attempt via GET&rdquo; rule below).</li>
<li>Implement a web application firewall (WAF) with rules to detect and block common XSS payloads to mitigate this and similar vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>reflected-xss</category></item><item><title>SiYuan Note Reflected XSS Vulnerability in SVG Processing</title><link>https://feed.craftedsignal.io/briefs/2026-04-siyuan-xss/</link><pubDate>Wed, 01 Apr 2026 00:30:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-siyuan-xss/</guid><description>SiYuan Note versions prior to the fix for commit f09953afc57a are vulnerable to reflected cross-site scripting (XSS) via a namespace prefix bypass in the SanitizeSVG function when handling dynamic icons, allowing unauthenticated attackers to execute arbitrary JavaScript in a victim's browser.</description><content:encoded><![CDATA[<p>SiYuan Note, a note-taking application, is susceptible to a reflected XSS vulnerability in its dynamic icon generation functionality. This flaw, present in versions prior to commit f09953afc57a, arises from an insufficient sanitization of SVG content, specifically failing to account for namespace prefixes in SVG elements. The vulnerability resides in the <code>/api/icon/getDynamicIcon</code> endpoint, which is accessible without authentication.  An attacker can exploit this by crafting a malicious SVG payload containing namespaced <code>&lt;script&gt;</code> tags (e.g., <code>&lt;x:script xmlns:x=&quot;http://www.w3.org/2000/svg&quot;&gt;</code>), which bypasses the application&rsquo;s XSS mitigation measures. Successful exploitation allows arbitrary JavaScript execution within the context of the victim&rsquo;s SiYuan Note instance, potentially leading to data theft or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious URL targeting the <code>/api/icon/getDynamicIcon</code> endpoint with the <code>type=8</code> parameter.</li>
<li>The crafted URL includes a <code>content</code> parameter containing a specially crafted SVG payload. This SVG payload leverages a namespace prefix to bypass the <code>SanitizeSVG</code> function&rsquo;s intended filtering, e.g., <code>%3C%2Fx%3Ascript%20xmlns%3Ax%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3Ealert%28document.domain%29%3C%2Fx%3Ascript%3E</code>.</li>
<li>The victim, either unknowingly or through social engineering, opens the malicious URL in their browser.</li>
<li>The SiYuan server processes the request without proper sanitization, inserting the attacker-controlled content into the SVG, and serves the response with <code>Content-Type: image/svg+xml</code>.</li>
<li>The browser&rsquo;s XML parser interprets the namespace prefix, resolving it to the SVG namespace, and executes the embedded JavaScript code.</li>
<li>The JavaScript code executes within the security context of the SiYuan application (<code>http://&lt;siyuan-host&gt;:6806</code>), due to <code>Access-Control-Allow-Origin: *</code>.</li>
<li>The attacker&rsquo;s script can now interact with the SiYuan API using the victim&rsquo;s session cookies.</li>
<li>The attacker can perform actions such as reading notes, exporting data, or modifying settings without authentication.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability poses a significant risk to SiYuan Note users, particularly those whose instances are reachable on a local network. An attacker could potentially compromise sensitive information, manipulate user data, or gain unauthorized access to the application. The ease of exploitation and the absence of authentication requirements make this vulnerability particularly dangerous. Because SiYuan sets <code>Access-Control-Allow-Origin: *</code> and the script runs same-origin, it can call any API endpoint using the victim&rsquo;s existing session cookies, including endpoints to read all notes, export data, or modify settings.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SiYuan Note to a version that includes the fix for commit f09953afc57a to remediate the vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect SiYuan SVG XSS Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for requests to <code>/api/icon/getDynamicIcon</code> containing SVG payloads with namespace-prefixed script tags, as demonstrated in the PoC.</li>
<li>Consider implementing a Content Security Policy (CSP) on the SiYuan server to restrict the execution of inline JavaScript.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>siyuan</category><category>svg</category><category>reflected-xss</category></item><item><title>Query Monitor WordPress Plugin Vulnerable to Reflected XSS (CVE-2026-4267)</title><link>https://feed.craftedsignal.io/briefs/2024-01-query-monitor-xss/</link><pubDate>Tue, 31 Mar 2026 12:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-query-monitor-xss/</guid><description>The Query Monitor WordPress plugin is vulnerable to reflected cross-site scripting (XSS) due to insufficient input sanitization and output escaping of the '$_SERVER['REQUEST_URI']' parameter, allowing unauthenticated attackers to inject arbitrary web scripts.</description><content:encoded><![CDATA[<p>The Query Monitor plugin for WordPress, a developer tool panel, is susceptible to a reflected Cross-Site Scripting (XSS) vulnerability. Identified as CVE-2026-4267, this flaw exists in all versions up to and including 3.20.3. The vulnerability arises from the plugin&rsquo;s failure to adequately sanitize input and escape output related to the <code>$_SERVER['REQUEST_URI']</code> parameter. An unauthenticated attacker can exploit this by injecting malicious web scripts into pages, posing a threat to users who…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>reflected-xss</category><category>cve-2026-4267</category></item></channel></rss>