CVE-2025-47204

MEDIUM EXPLOITED NUCLEI

Davidstutz Bootstrap Multiselect - CSRF

Title source: rule

Description

An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. A PHP script in the source code echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF).

Nuclei Templates (1)

Bootstrap Multiselect <= 1.1.2 - Cross-Site Scripting
MEDIUMVERIFIEDby r3naissance
Shodan: html:"bootstrap-multiselect"

Scores

CVSS v3 6.1
EPSS 0.0144
EPSS Percentile 80.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Exploitation Intel

VulnCheck KEV 2025-07-21

Classification

CWE
CWE-352
Status published

Affected Products (2)

davidstutz/bootstrap_multiselect
npm/bootstrap-multiselect npm

Timeline

Published May 13, 2025
Tracked Since Feb 18, 2026