Reflected Cross-Site Scripting (XSS) in Xibo CMS v4.1.2 from Xibo Signage, due to a lack of proper validation of user input. To exploit the vulnerability, the attacker must create a template in the 'Templates' section, then add an element that has the 'Configuration Name' field, such as the 'Clock' widget. Next, modify the 'Configuration Name' field in the left-hand section.
Advisories

No advisories yet.

Fixes

Solution

The vulnerabilitiy has been fixed by the Xibo Signage team in version 4.2.2.


Workaround

No workaround given by the vendor.

History

Tue, 21 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Xibosignage
Xibosignage xibo
Vendors & Products Xibosignage
Xibosignage xibo

Fri, 10 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Oct 2025 09:30:00 +0000

Type Values Removed Values Added
Description Reflected Cross-Site Scripting (XSS) in Xibo CMS v4.1.2 from Xibo Signage, due to a lack of proper validation of user input. To exploit the vulnerability, the attacker must create a template in the 'Templates' section, then add an element that has the 'Configuration Name' field, such as the 'Clock' widget. Next, modify the 'Configuration Name' field in the left-hand section.
Title Reflected Cross-Site Scripting (XSS) in CMS
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-10-10T13:37:04.706Z

Reserved: 2025-04-16T09:09:36.724Z

Link: CVE-2025-41089

cve-icon Vulnrichment

Updated: 2025-10-10T13:36:59.804Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-10T10:15:34.543

Modified: 2025-10-14T19:37:28.107

Link: CVE-2025-41089

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-21T13:14:33Z