CVE-2025-9647

Public Exploit
mtons mblog list cross site scripting

Description

A weakness has been identified in mtons mblog up to 3.5.0. This issue affects some unknown processing of the file /admin/role/list. This manipulation of the argument Name causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

Category

5.3
CVSS
Severity: Medium
CVSS 4.0 •
CVSS 3.1 •
CVSS 2.0 •
Third-Party Advisory vuldb.com
Affected: mtons mblog
Published at:
Updated at:

References

Link Tags
https://vuldb.com/?id.321854 technical description vdb entry
https://vuldb.com/?ctiid.321854 signature permissions required
https://vuldb.com/?submit.636627 third party advisory
https://gitee.com/mtons/mblog/issues/ICPMNE issue tracking exploit

Frequently Asked Questions

What is the severity of CVE-2025-9647?
CVE-2025-9647 has been scored as a medium severity vulnerability.
How to fix CVE-2025-9647?
To fix CVE-2025-9647, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-9647 being actively exploited in the wild?
It is possible that CVE-2025-9647 is being exploited or will be exploited in a near future based on public information.
What software or system is affected by CVE-2025-9647?
CVE-2025-9647 affects mtons mblog.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.