Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openobserve
Openobserve openobserve |
|
| Vendors & Products |
Openobserve
Openobserve openobserve |
Thu, 13 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenObserve is a cloud-native observability platform. In versions up to and including 0.16.1, when creating or renaming an organization with HTML in the name, the markup is rendered inside the invitation email. This indicates that user-controlled input is inserted into the email template without proper HTML escaping. As of time of publication, no patched versions are available. | |
| Title | OpenObserve Vulnerable to HTML Injection in Organization Invitation Emails | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-13T21:14:33.407Z
Reserved: 2025-11-10T22:29:34.871Z
Link: CVE-2025-64744
Updated: 2025-11-13T21:14:21.734Z
Status : Awaiting Analysis
Published: 2025-11-13T21:15:54.073
Modified: 2025-11-14T16:42:03.187
Link: CVE-2025-64744
No data.
OpenCVE Enrichment
Updated: 2025-11-14T09:27:40Z