A Stored Cross-Site Scripting (XSS) vulnerability exists in SeedDMS 6.0.29. A user or rogue admin with the "Add Category" permission can inject a malicious XSS payload into the category name field. When a document is subsequently associated with this category, the payload is stored on the server and rendered without proper sanitization or output encoding. This results in the XSS payload executing in the browser of any user who views the document.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 28 Feb 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | |
Metrics |
cvssV3_1
|
Fri, 28 Feb 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Stored Cross-Site Scripting (XSS) vulnerability exists in SeedDMS 6.0.29. A user or rogue admin with the "Add Category" permission can inject a malicious XSS payload into the category name field. When a document is subsequently associated with this category, the payload is stored on the server and rendered without proper sanitization or output encoding. This results in the XSS payload executing in the browser of any user who views the document. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-02-28T00:00:00.000Z
Updated: 2025-02-28T16:00:43.157Z
Reserved: 2025-02-07T00:00:00.000Z
Link: CVE-2025-25461

Updated: 2025-02-28T16:00:38.340Z

Status : Received
Published: 2025-02-28T16:15:39.387
Modified: 2025-02-28T16:15:39.387
Link: CVE-2025-25461

No data.