Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x6vr-q3vf-vqgq | REDAXO CMS is vulnerable to Reflected XSS in Mediapool Info Banner via args[types] |
Wed, 03 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:redaxo:redaxo:*:*:*:*:*:*:*:* |
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redaxo
Redaxo redaxo |
|
| Vendors & Products |
Redaxo
Redaxo redaxo |
Wed, 26 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. This issue has been patched in version 5.20.1. | |
| Title | REDAXO is Vulnerable to Reflected XSS in Mediapool Info Banner via args[types] | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-26T15:14:37.329Z
Reserved: 2025-11-21T01:08:02.614Z
Link: CVE-2025-66026
Updated: 2025-11-26T15:14:28.553Z
Status : Analyzed
Published: 2025-11-26T03:15:58.440
Modified: 2025-12-03T15:36:41.910
Link: CVE-2025-66026
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:26:07Z
Github GHSA