Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7508 | GeSHi XSS possible in the get_var function of /contrib/cssgen.php |
Github GHSA |
GHSA-pr6q-g5gv-qgr7 | GeSHi XSS possible in the get_var function of /contrib/cssgen.php |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 23 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qbnz
Qbnz geshi |
|
| CPEs | cpe:2.3:a:qbnz:geshi:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Qbnz
Qbnz geshi |
Mon, 10 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 09 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler. The manipulation of the argument default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |
| Title | GeSHi CSS cssgen.php get_var cross site scripting | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-03-10T15:35:51.889Z
Reserved: 2025-03-08T14:26:55.500Z
Link: CVE-2025-2123
Updated: 2025-03-10T15:35:28.635Z
Status : Analyzed
Published: 2025-03-09T15:15:36.413
Modified: 2025-06-23T18:53:22.017
Link: CVE-2025-2123
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA