mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
60 lines
2.7 KiB
JSON
60 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2025-25062",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2025-02-03T04:15:09.587",
|
|
"lastModified": "2025-02-03T04:15:09.587",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An XSS issue was discovered in Backdrop CMS 1.28.x before 1.28.5 and 1.29.x before 1.29.3. It doesn't sufficiently isolate long text content when the CKEditor 5 rich text editor is used. This allows a potential attacker to craft specialized HTML and JavaScript that may be executed when an administrator attempts to edit a piece of content. This vulnerability is mitigated by the fact that an attacker must have the ability to create long text content (such as through the node or comment forms) and an administrator must edit (not view) the content that contains the malicious content. This problem only exists when using the CKEditor 5 module."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubri\u00f3 un problema de XSS en Background CMS 1.28.x anterior a 1.28.5 y 1.29.x anterior a 1.29.3. No a\u00edsla lo suficiente el contenido de texto largo cuando se utiliza el editor de texto enriquecido CKEditor 5. Esto permite que un atacante potencial manipule HTML y JavaScript especializados que pueden ejecutarse cuando un administrador intenta editar un fragmento de contenido. Esta vulnerabilidad se mitiga por el hecho de que un atacante debe tener la capacidad de crear contenido de texto largo (por ejemplo, a trav\u00e9s de los formularios de nodos o comentarios) y un administrador debe editar (no ver) el contenido que contiene el contenido malicioso. Este problema solo existe cuando se utiliza el m\u00f3dulo CKEditor 5."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cve@mitre.org",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"baseScore": 4.4,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 1.3,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cve@mitre.org",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://backdropcms.org/security/backdrop-sa-core-2025-001",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |