Reflected Cross-Site Scripting (XSS) in Xibo CMS v4.1.2 from Xibo Signage, due to a lack of proper validation of user input. To exploit the vulnerability, the attacker must create a template in the 'Templates' section, then add an element that has the 'Configuration Name' field, such as the 'Clock' widget. Next, modify the 'Configuration Name' field in the left-hand section.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
The vulnerabilitiy has been fixed by the Xibo Signage team in version 4.2.2.
Workaround
No workaround given by the vendor.
References
History
Fri, 10 Oct 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Reflected Cross-Site Scripting (XSS) in Xibo CMS v4.1.2 from Xibo Signage, due to a lack of proper validation of user input. To exploit the vulnerability, the attacker must create a template in the 'Templates' section, then add an element that has the 'Configuration Name' field, such as the 'Clock' widget. Next, modify the 'Configuration Name' field in the left-hand section. | |
Title | Reflected Cross-Site Scripting (XSS) in CMS | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-10-10T13:37:04.706Z
Reserved: 2025-04-16T09:09:36.724Z
Link: CVE-2025-41089

No data.

Status : Received
Published: 2025-10-10T10:15:34.543
Modified: 2025-10-10T10:15:34.543
Link: CVE-2025-41089

No data.

No data.