REDAXO is a PHP-based CMS. In Redaxo from 5.0.0 through 5.18.2, the rex-api-result parameter is vulnerable to Reflected cross-site scripting (XSS) on the page of AddOns. This vulnerability is fixed in 5.18.3.
References
Link | Resource |
---|---|
https://github.com/redaxo/redaxo/security/advisories/GHSA-8366-xmgf-334f | Exploit Vendor Advisory |
Configurations
History
01 Jul 2025, 20:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/redaxo/redaxo/security/advisories/GHSA-8366-xmgf-334f - Exploit, Vendor Advisory | |
First Time |
Redaxo redaxo
Redaxo |
|
Summary |
|
|
CPE | cpe:2.3:a:redaxo:redaxo:*:*:*:*:*:*:*:* |
05 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-05 16:15
Updated : 2025-07-01 20:38
NVD link : CVE-2025-27412
Mitre link : CVE-2025-27412
CVE.ORG link : CVE-2025-27412
JSON object : View
Products Affected
redaxo
- redaxo
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')