Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 21 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:typesettercms:typesetter:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 15 Jan 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Typesettercms
Typesettercms typesetter |
|
| Vendors & Products |
Typesettercms
Typesettercms typesetter |
Wed, 14 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Typesetter CMS versions up to and including 5.1 contain a reflected cross-site scripting (XSS) vulnerability in the Editing component. The images parameter (submitted as images[] in a POST request) is reflected into an HTML href attribute without proper context-aware output encoding in include/tool/Editing.php. An authenticated attacker with editing privileges can supply a JavaScript pseudo-protocol (e.g., javascript:) to trigger arbitrary JavaScript execution in the context of the victim's browser session. | |
| Title | Typesetter CMS Reflected XSS via Editing.php | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:08:55.716Z
Reserved: 2026-01-14T18:12:51.759Z
Link: CVE-2025-71164
Updated: 2026-01-14T21:19:11.595Z
Status : Analyzed
Published: 2026-01-14T19:16:47.007
Modified: 2026-01-21T20:47:12.300
Link: CVE-2025-71164
No data.
OpenCVE Enrichment
Updated: 2026-01-15T08:03:12Z