CVE-2025-36750
Unknown Unknown - Not Provided
Stored XSS in ShineLan-X Plant Name Field Enables Code Execution

Publication date: 2025-12-13

Last updated on: 2025-12-13

Assigner: Dutch Institute for Vulnerability Disclosure

Description
ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the Plant Name field. A HTML payload will be displayed on the plant management page via a direct post. This may allow attackers to force a legitimate user’s browser’s JavaScript engine to run malicious code.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-13
Last Modified
2025-12-13
Generated
2026-05-07
AI Q&A
2025-12-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
shinelan x *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stored cross-site scripting (XSS) issue in ShineLan-X, specifically in the Plant Name field. An attacker can insert malicious HTML or JavaScript code into this field, which will then be displayed on the plant management page. When a legitimate user views this page, the malicious code runs in their browser, potentially allowing the attacker to execute unauthorized actions or steal information.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute malicious scripts in the browsers of legitimate users. This can lead to unauthorized actions such as stealing sensitive information, hijacking user sessions, or performing actions on behalf of the user without their consent, potentially compromising the security and integrity of your system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the stored cross site scripting (XSS) vulnerability in ShineLan-X, immediately avoid entering untrusted input into the Plant Name field. Apply any available patches or updates from the vendor that address this issue. Additionally, implement input validation and output encoding on the Plant Name field to prevent malicious HTML or JavaScript from being stored and executed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart