Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-xchange
Open-xchange ox App Suite |
|
| Vendors & Products |
Open-xchange
Open-xchange ox App Suite |
Fri, 31 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Malicious content from E-Mail can be used to perform a redressing attack. Users can be tricked to perform unintended actions or provide sensitive information to a third party which would enable further threats. Attribute values containing HTML fragments are now denied by the sanitization procedure. No publicly available exploits are known | |
| Weaknesses | CWE-1021 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2025-10-31T18:27:58.679Z
Reserved: 2025-03-18T08:39:46.884Z
Link: CVE-2025-30191
Updated: 2025-10-31T18:24:43.484Z
Status : Deferred
Published: 2025-10-31T09:15:47.860
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-30191
No data.
OpenCVE Enrichment
Updated: 2025-11-03T10:45:02Z