Reflected Cross-Site Scripting (XSS) in Xibo CMS v4.1.2 from Xibo Signage, due to a lack of proper validation of user input. To exploit the vulnerability, the attacker must create a template in the 'Templates' section, then add an element that has the 'Configuration Name' field, such as the 'Clock' widget. Next, modify the 'Configuration Name' field in the left-hand section.
Metrics
Affected Vendors & Products
References
History
Fri, 10 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 10 Oct 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Reflected Cross-Site Scripting (XSS) in Xibo CMS v4.1.2 from Xibo Signage, due to a lack of proper validation of user input. To exploit the vulnerability, the attacker must create a template in the 'Templates' section, then add an element that has the 'Configuration Name' field, such as the 'Clock' widget. Next, modify the 'Configuration Name' field in the left-hand section. | |
Title | Reflected Cross-Site Scripting (XSS) in CMS | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-10-10T13:37:04.706Z
Reserved: 2025-04-16T09:09:36.724Z
Link: CVE-2025-41089

Updated: 2025-10-10T13:36:59.804Z

Status : Received
Published: 2025-10-10T10:15:34.543
Modified: 2025-10-10T10:15:34.543
Link: CVE-2025-41089

No data.

No data.