diskover-web v2.3.0 Community Edition suffers from multiple stored cross-site scripting (XSS) vulnerabilities in its administrative settings interface. Various configuration fields such as ES_HOST, ES_INDEXREFRESH, ES_PORT, ES_SCROLLSIZE, ES_TRANSLOGSIZE, ES_TRANSLOGSYNCINT, EXCLUDES_FILES, FILE_TYPES[], INCLUDES_DIRS, INCLUDES_FILES, and TIMEZONE do not properly sanitize user-supplied input. Malicious payloads submitted via these parameters are persisted in the application and executed whenever an administrator views or edits the settings page.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-25897 diskover-web v2.3.0 Community Edition suffers from multiple stored cross-site scripting (XSS) vulnerabilities in its administrative settings interface. Various configuration fields such as ES_HOST, ES_INDEXREFRESH, ES_PORT, ES_SCROLLSIZE, ES_TRANSLOGSIZE, ES_TRANSLOGSYNCINT, EXCLUDES_FILES, FILE_TYPES[], INCLUDES_DIRS, INCLUDES_FILES, and TIMEZONE do not properly sanitize user-supplied input. Malicious payloads submitted via these parameters are persisted in the application and executed whenever an administrator views or edits the settings page.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 09 Sep 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Diskoverdata
Diskoverdata diskover
CPEs cpe:2.3:a:diskoverdata:diskover:2.3.0:*:*:*:community:*:*:*
Vendors & Products Diskoverdata
Diskoverdata diskover

Wed, 27 Aug 2025 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Diskover
Diskover diskover
Vendors & Products Diskover
Diskover diskover

Wed, 27 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 5.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 27 Aug 2025 15:00:00 +0000

Type Values Removed Values Added
Description diskover-web v2.3.0 Community Edition suffers from multiple stored cross-site scripting (XSS) vulnerabilities in its administrative settings interface. Various configuration fields such as ES_HOST, ES_INDEXREFRESH, ES_PORT, ES_SCROLLSIZE, ES_TRANSLOGSIZE, ES_TRANSLOGSYNCINT, EXCLUDES_FILES, FILE_TYPES[], INCLUDES_DIRS, INCLUDES_FILES, and TIMEZONE do not properly sanitize user-supplied input. Malicious payloads submitted via these parameters are persisted in the application and executed whenever an administrator views or edits the settings page.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-08-27T15:03:20.482Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50986

cve-icon Vulnrichment

Updated: 2025-08-27T15:01:43.798Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-27T15:15:38.647

Modified: 2025-09-09T18:53:34.990

Link: CVE-2025-50986

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-27T22:10:14Z