CVE-2025-27412

REDAXO is a PHP-based CMS. In Redaxo from 5.0.0 through 5.18.2, the rex-api-result parameter is vulnerable to Reflected cross-site scripting (XSS) on the page of AddOns. This vulnerability is fixed in 5.18.3.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:redaxo:redaxo:*:*:*:*:*:*:*:*

History

01 Jul 2025, 20:38

Type Values Removed Values Added
References () https://github.com/redaxo/redaxo/security/advisories/GHSA-8366-xmgf-334f - () https://github.com/redaxo/redaxo/security/advisories/GHSA-8366-xmgf-334f - Exploit, Vendor Advisory
First Time Redaxo redaxo
Redaxo
Summary
  • (es) REDAXO es un CMS basado en PHP. En Redaxo desde la versión 5.0.0 hasta la 5.18.2, el parámetro rex-api-result es vulnerable a ataques de Cross-Site Scripting (XSS) reflejado en la página de complementos. Esta vulnerabilidad se solucionó en la versión 5.18.3.
CPE cpe:2.3:a:redaxo:redaxo:*:*:*:*:*:*:*:*

05 Mar 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-05 16:15

Updated : 2025-07-01 20:38


NVD link : CVE-2025-27412

Mitre link : CVE-2025-27412

CVE.ORG link : CVE-2025-27412


JSON object : View

Products Affected

redaxo

  • redaxo
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')