CVE-2025-36750
Stored XSS in ShineLan-X Plant Name Field Enables Code Execution
Publication date: 2025-12-13
Last updated on: 2025-12-13
Assigner: Dutch Institute for Vulnerability Disclosure
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| shinelan | x | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stored cross-site scripting (XSS) issue in ShineLan-X, specifically in the Plant Name field. An attacker can insert malicious HTML or JavaScript code into this field, which will then be displayed on the plant management page. When a legitimate user views this page, the malicious code runs in their browser, potentially allowing the attacker to execute unauthorized actions or steal information.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to execute malicious scripts in the browsers of legitimate users. This can lead to unauthorized actions such as stealing sensitive information, hijacking user sessions, or performing actions on behalf of the user without their consent, potentially compromising the security and integrity of your system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the stored cross site scripting (XSS) vulnerability in ShineLan-X, immediately avoid entering untrusted input into the Plant Name field. Apply any available patches or updates from the vendor that address this issue. Additionally, implement input validation and output encoding on the Plant Name field to prevent malicious HTML or JavaScript from being stored and executed.