PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-5875 Dotcms CVE debrief

CVE-2017-5875 is an authenticated cross-site scripting (XSS) vulnerability in dotCMS 3.7.0. The issue is tied to the /myAccount addressID parameter and is cataloged by NVD as CWE-79. Because exploitation requires authentication and user interaction, the immediate risk is more targeted than a pre-authentication flaw, but it can still expose user data or alter browser-side behavior within the affected application.

Vendor
Dotcms
Product
CVE-2017-5875
CVSS
MEDIUM 5.4
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-06
Original CVE updated
2026-05-13
Advisory published
2017-02-06
Advisory updated
2026-05-13

Who should care

Organizations running dotCMS 3.7.0, especially teams that allow multiple authenticated users, editors, or contributors to access account-related functions. Security teams should also care if dotCMS is used in a public-facing content workflow or if stored user interactions are trusted without strong output handling.

Technical summary

NVD describes the issue as an XSS condition in dotCMS 3.7.0 affecting the /myAccount addressID parameter. The CVSS vector is CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, indicating network reachability, low attack complexity, required low privileges, and required user interaction. The weakness is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation).

Defensive priority

Medium priority. The CVSS score is 5.4 (Medium), but remediation should be expedited if the product is still deployed, particularly in environments where authenticated users can share links, view each other's content, or influence account-related pages.

Recommended defensive actions

  • Confirm whether dotCMS 3.7.0 is deployed anywhere in your environment.
  • Review vendor and project references for a fixed release or supported upgrade path before restoring or exposing the affected instance.
  • Treat /myAccount and any parameter handling around addressID as high-risk input paths and verify that output encoding and server-side validation are in place.
  • Restrict authenticated access to only the minimum necessary roles until remediation is complete.
  • Scan for similar reflected or stored XSS patterns across other dotCMS account and profile-related endpoints.
  • If mitigation cannot be applied immediately, reduce exposure by limiting who can access the application and by monitoring for unusual account-page activity.

Evidence notes

The NVD record lists dotCMS 3.7.0 as vulnerable and assigns CWE-79 with CVSS 3.0 vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The supplied CVE description states the attack targets the /myAccount addressID parameter and requires authentication. Linked references include a SecurityFocus BID entry and a dotCMS GitHub issue reference, both of which support the reported vulnerability context.

Official resources

Publicly disclosed via the CVE/NVD record on 2017-02-06; the NVD entry was last modified on 2026-05-13.