Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 08 Dec 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:* |
Wed, 05 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 05 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xibosignage
Xibosignage xibo |
|
| Vendors & Products |
Xibosignage
Xibosignage xibo |
Tue, 04 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 04 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Xibo is an open source digital signage platform with a web content management system (CMS). Versions 4.3.0 and below contain a Remote Code Execution vulnerability in the CMS Developer menu's Module Templating functionality, allowing authenticated users with "System -> Add/Edit custom modules and templates" permissions to manipulate Twig filters and execute arbitrary server-side functions as the web server user. This issue is fixed in version 4.3.1. To workaround this issue, use the 4.1 and 4.2 patch commits. | |
| Title | Xibo CMS: Remote Code Execution through module templates | |
| Weaknesses | CWE-1336 CWE-94 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-05T14:29:33.887Z
Reserved: 2025-10-10T14:22:48.204Z
Link: CVE-2025-62369
Updated: 2025-11-04T21:37:15.229Z
Status : Analyzed
Published: 2025-11-04T22:16:38.160
Modified: 2025-12-08T13:30:12.790
Link: CVE-2025-62369
No data.
OpenCVE Enrichment
Updated: 2025-11-05T10:47:07Z