Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
The vulnerabilitiy has been fixed by the Xibo Signage team in version 4.2.2.
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xibosignage
Xibosignage xibo |
|
| Vendors & Products |
Xibosignage
Xibosignage xibo |
Fri, 10 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Reflected Cross-Site Scripting (XSS) in Xibo CMS v4.1.2 from Xibo Signage, due to a lack of proper validation of user input. To exploit the vulnerability, the attacker must create a template in the 'Templates' section, then add an element that has the 'Configuration Name' field, such as the 'Clock' widget. Next, modify the 'Configuration Name' field in the left-hand section. | |
| Title | Reflected Cross-Site Scripting (XSS) in CMS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-10-10T13:37:04.706Z
Reserved: 2025-04-16T09:09:36.724Z
Link: CVE-2025-41089
Updated: 2025-10-10T13:36:59.804Z
Status : Awaiting Analysis
Published: 2025-10-10T10:15:34.543
Modified: 2025-10-14T19:37:28.107
Link: CVE-2025-41089
No data.
OpenCVE Enrichment
Updated: 2025-10-21T13:14:33Z