CVE-2025-11147
BaseFortify
Publication date: 2025-09-29
Last updated on: 2025-10-16
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apt-cacher-ng_project | apt-cacher-ng | 3.2-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-11147 is a reflected cross-site scripting (XSS) vulnerability in Apt-Cacher-NG version 3.2.1. It occurs because the application improperly handles input in the URL path "/html/<filename>.html", allowing attackers to inject and execute malicious scripts in the context of the web application. This can lead to unauthorized script execution when a user accesses a crafted URL.
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute malicious scripts in the context of the Apt-Cacher-NG web interface, potentially compromising user interactions. This could lead to theft of sensitive information, session hijacking, or other malicious actions performed on behalf of the user.
What immediate steps should I take to mitigate this vulnerability?
Update Apt-Cacher-NG to the latest software release where the vulnerability has been fixed. Avoid using vulnerable versions such as 3.2.1. Additionally, restrict access to the web management interface to trusted users to reduce the risk of exploitation. [1]