Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26189 | A weakness has been identified in mtons mblog up to 3.5.0. This issue affects some unknown processing of the file /admin/role/list. This manipulation of the argument Name causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. |
Fri, 14 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mtons
Mtons mblog |
|
| CPEs | cpe:2.3:a:mtons:mblog:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mtons
Mtons mblog |
Fri, 29 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 29 Aug 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in mtons mblog up to 3.5.0. This issue affects some unknown processing of the file /admin/role/list. This manipulation of the argument Name causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. | |
| Title | mtons mblog list cross site scripting | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-08-29T13:45:48.076Z
Reserved: 2025-08-29T06:05:35.072Z
Link: CVE-2025-9647
Updated: 2025-08-29T13:45:42.849Z
Status : Analyzed
Published: 2025-08-29T13:15:39.763
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-9647
No data.
OpenCVE Enrichment
No data.
EUVD