REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. This issue has been patched in version 5.20.1.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x6vr-q3vf-vqgq | REDAXO CMS is vulnerable to Reflected XSS in Mediapool Info Banner via args[types] |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 26 Nov 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. This issue has been patched in version 5.20.1. | |
| Title | REDAXO is Vulnerable to Reflected XSS in Mediapool Info Banner via args[types] | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-26T02:01:44.814Z
Reserved: 2025-11-21T01:08:02.614Z
Link: CVE-2025-66026
No data.
Status : Received
Published: 2025-11-26T03:15:58.440
Modified: 2025-11-26T03:15:58.440
Link: CVE-2025-66026
No data.
OpenCVE Enrichment
No data.
Github GHSA