Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
The vulnerability has been fixed by the Xibo Signage team in version 4.2.2.
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xibosignage
Xibosignage xibo |
|
| Vendors & Products |
Xibosignage
Xibosignage xibo |
Fri, 10 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stored Cross-Site Scripting (XSS) in Xibo Signage's Xibo CMS v4.1.2, due to a lack of proper validation of user input. To exploit the vulnerability, the attacker must create a template in the 'Templates' section, then add a text element in the 'Global Elements' section, and finally modify the 'Text' field in the section with the malicious payload. | |
| Title | Stored Cross-Site Scripting (XSS) in CMS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-10-10T13:37:54.494Z
Reserved: 2025-04-16T09:09:36.724Z
Link: CVE-2025-41088
Updated: 2025-10-10T13:37:51.052Z
Status : Awaiting Analysis
Published: 2025-10-10T10:15:34.350
Modified: 2025-10-14T19:37:28.107
Link: CVE-2025-41088
No data.
OpenCVE Enrichment
Updated: 2025-10-21T13:14:32Z