CVE-2025-48109

Xavier · Xavier Media XM-Backup

**A high-severity Cross-Site Request Forgery (CSRF) vulnerability in Xavier Media XM-Backup allows an attacker to inject malicious scripts, potentially leading to administrative account takeover.**.

Executive summary

A high-severity Cross-Site Request Forgery (CSRF) vulnerability in Xavier Media XM-Backup allows an attacker to inject malicious scripts, potentially leading to administrative account takeover.

Vulnerability

This is a Cross-Site Request Forgery (CSRF) vulnerability. An unauthenticated attacker can craft a malicious link or web page that, when visited by an authenticated administrator, forces their browser to execute actions within the XM-Backup plugin. This can be leveraged to inject a persistent script (Stored XSS).

Business impact

Rated as High severity with a CVSS score of 7.1, this flaw poses a serious threat. By tricking an administrator, an attacker could inject a malicious script that executes for any user visiting the site, leading to session hijacking, credential theft, or further propagation of the attack. Ultimately, this could result in a full compromise of the website.

Remediation

Immediate Action: Update the Xavier Media XM-Backup plugin to the latest patched version provided by the vendor.

Proactive Monitoring: Review website content and plugin settings for any unauthorized changes or injected scripts. Monitor logs for suspicious administrative actions originating from unexpected referrers.

Compensating Controls: A Web Application Firewall (WAF) with strong CSRF and XSS protection rules can help mitigate this vulnerability by blocking malicious requests before they reach the application.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The combination of CSRF and Stored XSS is potent and presents a clear path to site compromise. Given the High severity, administrators must update the XM-Backup plugin immediately. Failure to do so leaves the website and its data vulnerable to takeover.