CVE-2018-25248
Published: 04 April 2026
Summary
CVE-2018-25248 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Mybb Mybb Downloads. Its CVSS base score is 7.2 (High).
Operationally, ranked at the 9.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of information inputs such as the download title field to block injection of malicious HTML/JavaScript by regular members.
Mandates filtering of information outputs like the download title when displayed to administrators in downloads.php to prevent execution of injected scripts.
Directs identification, testing, and deployment of fixes or patches for the specific XSS flaw in MyBB Downloads Plugin 2.0.3.
NVD Description
MyBB Downloads Plugin 2.0.3 contains a persistent cross-site scripting vulnerability that allows regular members to inject malicious scripts through the download title field. Attackers can submit a new download with HTML/JavaScript code in the title parameter, which executes when administrators…
more
validate the download in downloads.php.
Deeper analysisAI
CVE-2018-25248 is a persistent cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting the MyBB Downloads Plugin version 2.0.3. The flaw resides in the download title field within downloads.php, where attackers can inject malicious HTML or JavaScript code. Published on 2026-04-04, it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N), reflecting high severity due to its network accessibility, low complexity, lack of required privileges, no user interaction, and scope change.
Regular members of a MyBB forum can exploit this vulnerability by submitting a new download entry with malicious scripts embedded in the title parameter. The injected code persists and executes in the administrator's browser context when they validate the pending download via downloads.php, potentially leading to session hijacking, data theft, or further compromise of the admin account.
Advisories and related resources, including the MyBB community mod page (https://community.mybb.com/mods.php?action=view&pid=854), an Exploit-DB entry (https://www.exploit-db.com/exploits/44400), and a VulnCheck advisory (https://www.vulncheck.com/advisories/mybb-downloads-plugin-persistent-xss-via-downloads-php), provide further details on the issue and proof-of-concept exploitation. Security practitioners should consult these for mitigation guidance, such as plugin updates or input sanitization.
Details
- CWE(s)