CVE-2025-48109
Xavier · Xavier Media XM-Backup
**A high-severity Cross-Site Request Forgery (CSRF) vulnerability in Xavier Media XM-Backup allows an attacker to inject malicious scripts, potentially leading to administrative account takeover.**.
Executive summary
A high-severity Cross-Site Request Forgery (CSRF) vulnerability in Xavier Media XM-Backup allows an attacker to inject malicious scripts, potentially leading to administrative account takeover.
Vulnerability
This is a Cross-Site Request Forgery (CSRF) vulnerability. An unauthenticated attacker can craft a malicious link or web page that, when visited by an authenticated administrator, forces their browser to execute actions within the XM-Backup plugin. This can be leveraged to inject a persistent script (Stored XSS).
Business impact
Rated as High severity with a CVSS score of 7.1, this flaw poses a serious threat. By tricking an administrator, an attacker could inject a malicious script that executes for any user visiting the site, leading to session hijacking, credential theft, or further propagation of the attack. Ultimately, this could result in a full compromise of the website.
Remediation
Immediate Action: Update the Xavier Media XM-Backup plugin to the latest patched version provided by the vendor.
Proactive Monitoring: Review website content and plugin settings for any unauthorized changes or injected scripts. Monitor logs for suspicious administrative actions originating from unexpected referrers.
Compensating Controls: A Web Application Firewall (WAF) with strong CSRF and XSS protection rules can help mitigate this vulnerability by blocking malicious requests before they reach the application.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The combination of CSRF and Stored XSS is potent and presents a clear path to site compromise. Given the High severity, administrators must update the XM-Backup plugin immediately. Failure to do so leaves the website and its data vulnerable to takeover.