CVE-2025-11966
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-22
Assigner: Eclipse Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eclipse | vert.x | 4.0.0 |
| eclipse | vert.x | 5.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-80 | The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in Eclipse Vert.x versions 4.0.0 to 4.5.21 and 5.0.0 to 5.0.4 when directory listing is enabled. File and directory names are inserted into generated HTML without proper escaping in href, title, and link attributes. An attacker who can create or rename files or directories within the served path can craft filenames containing malicious script or HTML content, leading to stored cross-site scripting (XSS) that executes in the context of users viewing the affected directory listing. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute stored cross-site scripting (XSS) attacks on users who view the affected directory listings. This can lead to unauthorized script execution in users' browsers, potentially resulting in session hijacking, data theft, or other malicious actions performed in the context of the affected application. [1]