
Cloud Vulnerability DB
A community-led vulnerabilities database
A Stored Cross-Site Scripting (XSS) vulnerability (CVE-2025-51487) was discovered in MoonShine versions prior to 3.12.5. The vulnerability was disclosed on August 19, 2025, and allows attackers to execute arbitrary JavaScript by using 'javascript:' payload in the CutCode Link parameter when creating or updating a new Article (NVD, MoonShine PoCs).
The vulnerability is classified as a Stored Cross-Site Scripting (XSS) issue with a CVSS v3.1 Base Score of 4.5 (Medium) and vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N. The vulnerability is tracked as CWE-79 (Improper Neutralization of Input During Web Page Generation). The issue specifically occurs in the Article creation/update functionality where the CutCode Link parameter fails to properly validate and sanitize input, allowing the injection of JavaScript protocol handlers instead of the expected HTTPS protocol (NVD).
When successfully exploited, this vulnerability allows attackers to store and execute arbitrary JavaScript in the browser of users who view the affected article. This can lead to potential theft of sensitive information, session hijacking, or other client-side attacks (MoonShine PoCs).
Users are advised to upgrade to MoonShine version 3.12.5 or later which contains fixes for this vulnerability. The update addresses the input validation issues in the CutCode Link parameter (MoonShine).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."