| CVE ID | CVE-2025-9982 |
| Publication date | 14 November 2025 |
| Vendor | OpenSolution |
| Product | QuickCMS |
| Vulnerable versions | 6.8 |
| Vulnerability type (CWE) | Plaintext Storage of a Password (CWE-256) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2025-10018 |
| Publication date | 14 November 2025 |
| Vendor | OpenSolution |
| Product | QuickCMS |
| Vulnerable versions | 6.8 |
| Vulnerability type (CWE) | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') (CWE-79) |
| Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities in OpenSolution QuickCMS software and participated in coordination of their disclosure.
The vulnerability CVE-2025-9982: A vulnerability exists in QuickCMS version 6.8 where sensitive admin credentials are hardcoded in a configuration file and stored in plaintext. This flaw allows attackers with access to the source code or the server file system to retrieve authentication details, potentially leading to privilege escalation.
The vulnerability CVE-2025-10018: QuickCMS is vulnerable to multiple Stored XSS in language editor functionality languages. Malicious attacker with admin privileges can inject arbitrary HTML and JS into website, which will be rendered/executed on every page. By default admin user is not able to add JavaScript into the website.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Credits
We thank Karol Czubernat for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.