CVE-2025-41089
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-10

Last updated on: 2025-10-14

Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)

Description
Reflected Cross-Site Scripting (XSS) in Xibo CMS v4.1.2 from Xibo Signage, due to a lack of proper validation of user input. To exploit the vulnerability, the attacker must create a template in the 'Templates' section, then add an element that has the 'Configuration Name' field, such as the 'Clock' widget. Next, modify the 'Configuration Name' field in the left-hand section.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-10
Last Modified
2025-10-14
Generated
2026-05-07
AI Q&A
2025-10-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
xibo xibo_cms <4.2.2
xibo xibo_cms 4.1.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Reflected Cross-Site Scripting (XSS) issue in Xibo CMS version 4.1.2. It occurs because the application does not properly validate user input in the 'Configuration Name' field of certain elements, such as the 'Clock' widget, within templates. An attacker can exploit this by creating a template, adding such an element, and then modifying the 'Configuration Name' field to inject malicious scripts that get reflected back to users.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute malicious scripts in the context of the victim's browser when they view the affected template. This can lead to theft of sensitive information, session hijacking, or performing actions on behalf of the user without their consent, potentially compromising the security and integrity of the affected system and its users.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart