Cross Site Scripting Vulnerability in Philipinho Simple-PHP-Blog
CVE-2025-15223

5.3MEDIUM

Key Information:

Vendor

Philipinho

Vendor
CVE Published:
31 December 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-15223?

A Cross Site Scripting vulnerability exists in Philipinho Simple-PHP-Blog, specifically in the /login.php file. The vulnerability arises when an attacker manipulates the Username parameter, enabling remote execution of malicious scripts. This issue affects the product's integrity, making user data susceptible to theft or unauthorized access. The vendor has indicated that the software is intended for educational purposes only, highlighting the need for caution in its deployment. Exploitation of this flaw is possible, and the details have been disclosed publicly, underlining the importance of patching and vigilance.

Affected Version(s)

Simple-PHP-Blog 94b5d3e57308bce5dfbc44c3edafa9811893d958

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

dazhi (VulDB User)
.
CVE-2025-15223 : Cross Site Scripting Vulnerability in Philipinho Simple-PHP-Blog