Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-0178

Summary
Assigner-WatchGuard
Assigner Org ID-5d1c2695-1a31-4499-88ae-e847036fd7e3
Published At-14 Feb, 2025 | 13:22
Updated At-14 Feb, 2025 | 14:01
Rejected At-
Credits

WatchGaurd Firebox Host Header Injection Vulnerability

Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI. This issue affects Fireware OS: from 12.0 up to and including 12.11.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:WatchGuard
Assigner Org ID:5d1c2695-1a31-4499-88ae-e847036fd7e3
Published At:14 Feb, 2025 | 13:22
Updated At:14 Feb, 2025 | 14:01
Rejected At:
▼CVE Numbering Authority (CNA)
WatchGaurd Firebox Host Header Injection Vulnerability

Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI. This issue affects Fireware OS: from 12.0 up to and including 12.11.

Affected Products
Vendor
WatchGuard Technologies, Inc.WatchGuard
Product
Fireware OS
Default Status
unaffected
Versions
Affected
  • From 12.0 through 12.5.12+701324 (semver)
  • From 12.6.0 through 12.11 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-20CWE-20 Improper Input Validation
Type: CWE
CWE ID: CWE-20
Description: CWE-20 Improper Input Validation
Metrics
VersionBase scoreBase severityVector
4.05.1MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L
Version: 4.0
Base score: 5.1
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-141CAPEC-141 Cache Poisoning
CAPEC ID: CAPEC-141
Description: CAPEC-141 Cache Poisoning
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00003
N/A
Hyperlink: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00003
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:5d1c2695-1a31-4499-88ae-e847036fd7e3
Published At:14 Feb, 2025 | 14:15
Updated At:02 Mar, 2026 | 19:07

Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI. This issue affects Fireware OS: from 12.0 up to and including 12.11.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.05.1MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 4.0
Base score: 5.1
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CPE Matches

WatchGuard Technologies, Inc.
watchguard
>>fireware>>Versions from 12.5(inclusive) to 12.5.13(exclusive)
cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_t15>>*
cpe:2.3:h:watchguard:firebox_t15:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_t35>>*
cpe:2.3:h:watchguard:firebox_t35:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>fireware>>Versions from 12.0.0(inclusive) to 12.11.1(exclusive)
cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m270>>*
cpe:2.3:h:watchguard:firebox_m270:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m290>>*
cpe:2.3:h:watchguard:firebox_m290:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m370>>*
cpe:2.3:h:watchguard:firebox_m370:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m390>>*
cpe:2.3:h:watchguard:firebox_m390:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m440>>*
cpe:2.3:h:watchguard:firebox_m440:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m4600>>*
cpe:2.3:h:watchguard:firebox_m4600:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m470>>*
cpe:2.3:h:watchguard:firebox_m470:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m4800>>*
cpe:2.3:h:watchguard:firebox_m4800:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m5600>>*
cpe:2.3:h:watchguard:firebox_m5600:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m570>>*
cpe:2.3:h:watchguard:firebox_m570:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m5800>>*
cpe:2.3:h:watchguard:firebox_m5800:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m590>>*
cpe:2.3:h:watchguard:firebox_m590:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m670>>*
cpe:2.3:h:watchguard:firebox_m670:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_m690>>*
cpe:2.3:h:watchguard:firebox_m690:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_nv5>>*
cpe:2.3:h:watchguard:firebox_nv5:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_t20>>*
cpe:2.3:h:watchguard:firebox_t20:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_t25>>*
cpe:2.3:h:watchguard:firebox_t25:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_t40>>*
cpe:2.3:h:watchguard:firebox_t40:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_t45>>*
cpe:2.3:h:watchguard:firebox_t45:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_t55>>*
cpe:2.3:h:watchguard:firebox_t55:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_t70>>*
cpe:2.3:h:watchguard:firebox_t70:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_t80>>*
cpe:2.3:h:watchguard:firebox_t80:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>firebox_t85>>*
cpe:2.3:h:watchguard:firebox_t85:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>fireboxcloud>>*
cpe:2.3:h:watchguard:fireboxcloud:*:*:*:*:*:*:*:*
WatchGuard Technologies, Inc.
watchguard
>>fireboxv>>*
cpe:2.3:h:watchguard:fireboxv:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Secondary5d1c2695-1a31-4499-88ae-e847036fd7e3
CWE ID: CWE-20
Type: Secondary
Source: 5d1c2695-1a31-4499-88ae-e847036fd7e3
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-000035d1c2695-1a31-4499-88ae-e847036fd7e3
Vendor Advisory
Hyperlink: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00003
Source: 5d1c2695-1a31-4499-88ae-e847036fd7e3
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

68Records found

CVE-2023-40314
Matching Score-4
Assigner-The OpenNMS Group
ShareView Details
Matching Score-4
Assigner-The OpenNMS Group
CVSS Score-5.8||MEDIUM
EPSS-0.21% / 43.90%
||
7 Day CHG~0.00%
Published-16 Nov, 2023 | 21:14
Updated-29 Aug, 2024 | 14:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-site scripting in bootstrap.jsp

Cross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Moshe Apelbaum for reporting this issue.

Action-Not Available
Vendor-opennmsThe OpenNMS Group
Product-meridianhorizonHorizonMeridian
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-20
Improper Input Validation
CVE-2021-39186
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.30% / 53.44%
||
7 Day CHG~0.00%
Published-01 Sep, 2021 | 20:35
Updated-04 Aug, 2024 | 01:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in GlobalNewFiles

GlobalNewFiles is a MediaWiki extension maintained by Miraheze. Prior to commit number cee254e1b158cdb0ddbea716b1d3edc31fa4fb5d, the username column of the GlobalNewFiles special page is vulnerable to a stored XSS. Commit number cee254e1b158cdb0ddbea716b1d3edc31fa4fb5d contains a patch. As a workaround, one may disallow <,> (or other characters required to insert html/js) from being used in account names so an XSS is not possible.

Action-Not Available
Vendor-mirahezemiraheze
Product-globalnewfilesGlobalNewFiles
CWE ID-CWE-20
Improper Input Validation
CVE-2024-3841
Matching Score-4
Assigner-Chrome
ShareView Details
Matching Score-4
Assigner-Chrome
CVSS Score-7.6||HIGH
EPSS-0.30% / 53.27%
||
7 Day CHG~0.00%
Published-17 Apr, 2024 | 07:46
Updated-13 Feb, 2025 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient data validation in Browser Switcher in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to inject scripts or HTML into a privileged page via a malicious file. (Chromium security severity: Medium)

Action-Not Available
Vendor-Fedora ProjectMicrosoft CorporationGoogle LLC
Product-chromewindowsfedoraChromechrome
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-23840
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.13% / 32.58%
||
7 Day CHG+0.03%
Published-19 Jan, 2026 | 18:32
Updated-03 Feb, 2026 | 14:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Movary vulnerable to Cross-site Scripting with `?categoryDeleted=` param

Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is `?categoryDeleted=`. Version 0.70.0 fixes the issue.

Action-Not Available
Vendor-leepeukerleepeuker
Product-movarymovary
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-28855
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.1||HIGH
EPSS-1.54% / 81.19%
||
7 Day CHG~0.00%
Published-18 Mar, 2024 | 21:46
Updated-08 Jan, 2025 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZITADEL vulnerable to improper HTML sanitization

ZITADEL, open source authentication management software, uses Go templates to render the login UI. Due to a improper use of the `text/template` instead of the `html/template` package, the Login UI did not sanitize input parameters prior to versions 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15, and 2.41.15. An attacker could create a malicious link, where he injected code which would be rendered as part of the login screen. While it was possible to inject HTML including JavaScript, the execution of such scripts would be prevented by the Content Security Policy. Versions 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15, and 2.41.15 contain a patch for this issue. No known workarounds are available.

Action-Not Available
Vendor-zitadelzitadelzitadel
Product-zitadelzitadelzitadel
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-8075
Matching Score-4
Assigner-Hanwha Vision Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Hanwha Vision Co., Ltd.
CVSS Score-5.8||MEDIUM
EPSS-0.02% / 4.22%
||
7 Day CHG~0.00%
Published-26 Dec, 2025 | 04:31
Updated-07 Jan, 2026 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation

Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered that validation of incoming XML format request messages is inadequate. This vulnerability could allow an attacker to XSS on the user's browser. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.

Action-Not Available
Vendor-hanwhavisionHanwha Vision Co., Ltd.
Product-xno-6120qnv-c8011r_firmwarexnd-8081rv_firmwarexnp-8250rxnv-6080rw_firmwarexnp-c9303rwxnd-8040r_firmwarepnm-9084rqz1_firmwaretnv-c8014rmxnd-9083rv_pnm-9000vq_firmwarexnf-8010rwpnm-9084qz_firmwarexnv-c9083rpnm-9084rqz_firmwareknp-2120hnqnv-c8083r_firmwareqne-c9013rlqnd-c8013r_firmwarexnd-8080rw_firmwarexnf-9010rspnm-7000vdxnp-6321_firmwarexnd-6081revpnm-9084qz1_firmwarexnf-9010rvknp-2550rhaqnp-6320h_firmwarexnv-c7083r_firmwarexno-6080rs_firmwarepnm-9081vqkno-2080rn_firmwareqnf-8010xnz-l6320axnv-6120pnm-9085rqzxnd-6085v_firmwareqnp-6250hxnf-8010rvmnbxnv-c9083r_firmwarexnp-6321h_firmwareqnp-6320r_firmwarexno-c8083rxnd-8080rxnv-6123r_firmwarexnd-9082rv_firmwareqnf-c9010qnp-6320_firmwarexnv-8080rsqnp-6230h_firmwarexno-6083rxnv-8080r_firmwarexnv-8081re_xnp-8300rw_firmwarexnf-9013rv_firmwarexnb-8002_firmwareqnv-c9083r_firmwarexnv-6083rzxnv-8080rsaxnd-l6080vxno-6123r_firmwarexnv-9082rxnv-6081_firmwarexnv-8083rzxnp-6120h_firmwarexnb-9003qnp-6320hxnz-6320apnm-7000vd_firmwarexnv-c6083rxnb-6000_firmwarexnd-8080rv_firmwarexnv-8020rxnb-9002_firmwarexnv-8083rx_xnp-c6403xnp-6371rhqnf-c9010_firmwarexnd-6081rev_firmwareknd-2020rnqnp-6250xnd-6085xnp-6250rhqnv-c6083rxnd-6083rvxnv-9083rzxnb-6005_firmwarexnv-8030r_firmwarexno-8040rxnd-8081revxnz-6320_firmwarexnv-6022rxnp-c6403rwqno-c9083rpnm-9084qz1xnd-l6080rvxnd-6081rfqne-c9013rl_firmwarexnd-l6080rxno-9082rzxnp-c9253r__firmwarexnv-6012xnv-8083rvx_firmwareknp-2320rh_firmwarexnv-6022rmknb-5000nxnp-6371rh_firmwarexnd-c9083rv_firmwarexnp-9300rw_firmwarexno-6120rs_firmwareqnp-6230xnv-c8083r_firmwarexnv-6120_firmwarexnp-c8303rwxnf-8010rpnm-9000vqxnv-6081r_firmwarexnf-9010rvmxnp-6341rh_firmwarexnd-9082rfxnp-9250_firmwarexnv-8083z_firmwarexnd-8081vzknp-2320rhxno-8020rknd-5020rnxno-c7083rkno-5020rn_firmwarexnd-8082rfxnp-6400rqnv-c8083rxnd-8080rvknp-2120hn_firmwarexnb-9002xnd-6081vz_firmwarepnm-9002vq_firmwareqno-c8013r_firmwarexnv-8081z_firmwarexnp-c8253_firmwarexnp-c6403r_pnm-9080vq_firmwarexnb-8003xnv-6083zxnv-8083rz_firmwarexnp-c6403_firmwarexnd-c6083rvxnd-6081vxnp-c9253_firmwarexnv-6012mxnd-6080rv_firmwarexnd-l6080va_firmwarexnv-8020rmnkno-5080rnxnf-9010rvm_firmwarexnv-c6083_firmwarexnv-l6080raxno-9082rz_firmwarexnp-c8253pnm-9085rqz_firmwarexnv-6123rxnp-c8253r__firmwarexnd-6011f_firmwarexnp-6341rhqnp-6230hxnd-6080xnp-c9303rw_firmwaretnv-c8011rw_firmwarexnd-8081rf_firmwarexnd-6081fzxnd-8081fz_firmwarekno-2120rn_firmwarexnd-6081rvxnv-6120rspnm-9320vqpxnv-6083z_firmwarexnd-6081rv_firmwarexnv-9083r_firmwarexnd-c9083rvtnv-c8011rwxnv-8081re__firmwarexnv-6012_firmwarexnv-6080_firmwarexnp-c9253r_xnv-6120rs_firmwarexnd-8030r_firmwarexnv-6011_firmwarexnd-6080v_firmwarexnp-6040h_firmwarexnv-c6083xnv-8040rxnv-8081r_firmwarexnv-6022rm_firmwarexnp-6250rh_firmwarekno-5080rn_firmwarexnd-9083rv__firmwarexnv-c7083rxnd-6085_firmwarexnd-c7083rvxnv-8083rvxpnm-9321vqp_firmwarexno-8020r_firmwarexnd-6010_firmwarexnp-c8303rw_firmwaretnv-c7013rcknd-2010_firmwarexnd-8020fxnd-8040rxnv-l6080a_firmwarexnd-6080rknb-2000_firmwarexnz-l6320_firmwarexnd-8081fzxnf-8010rvw_firmwareknp-2320rha_firmwarexnd-8083rv_knp-2550rha_firmwareqnp-6250h_firmwarexnd-8093rv_xno-8083rxnv-6081z_firmwarexnv-6081xnp-6400pnm-7002vd_firmwareqnp-6250_firmwarexnv-6120rqnv-c8011rxnd-8082rvxnd-l6020rxno-6083r_firmwarexno-6010r_firmwareknb-5000n_firmwareqnp-6230_firmwarexnb-6005xnv-8030rxnv-6085xnd-c6083rv_firmwarexno-8082rxnv-6085_firmwarexnv-6080rxnd-6085vknd-5020rn_firmwarexnd-6080r_firmwareknd-5080rn_firmwarexnv-c6083r_firmwarexnv-8082rxnd-8083rvx_firmwarexnv-9083rz_firmwarexnp-c8253r_qne-c8013rl_firmwarexnv-6120r_firmwareqnf-c9010vxnv-8080rsa_firmwarexnv-6010qnp-6250r_firmwarexnv-6020rxnv-9083rqnd-c8013rxnv-8083r_firmwarexnd-l6080r_firmwarexnv-6083rz_firmwarexno-6020rxnf-8010rvxnv-6081re_firmwarexnd-6020r_firmwarexnp-6040hxnp-9300rwxnv-c8083rxnd-8030rxnp-9250xnp-8250r_firmwarexnp-6320h_firmwarexnp-c7310r_xnd-8080rwxnv-6080rsa_firmwareknd-2010qnv-c6083r_firmwarexnv-6080rwxnv-l6080_firmwareqno-c8083r_firmwarexnp-c9253xnd-6081fz_firmwarexnv-6083rxnz-6320a_firmwarexnd-9082rvxno-8080rwxnb-6003_firmwarexnv-8093r_firmwarexno-8030rqnp-6320rtnv-c7013rc_firmwarexno-8030r_firmwarexnv-8020rmn_firmwarexnd-l6080v_firmwarexno-6123rqnv-c9011r_firmwarexnv-8083rx__firmwarexnd-6081rf_firmwarexnb-8003_firmwaretnb-6030xnd-8093rv__firmwarexnd-c8083rv_firmwareqnv-c8023rxno-8082r_firmwarexnp-6321hxnv-6081zxnd-8083rv__firmwarexnp-c9310r__firmwarexnp-c7310r__firmwarexnp-8250_firmwarexnd-l6080rva_firmwarexnd-l6020r_firmwarexnv-8080rxnd-l6080rvaxnp-6320hs_firmwarexnd-6080vxnf-8010rvmnb_firmwarexnb-6002xnd-k6080nxno-9083r_firmwarekno-2010rn_firmwarexnp-6400rwxnd-c8083rvxnd-8081rvxnp-c9310r_xnv-6081rexnv-l6080knd-5080rnxno-l6080rxnv-8020r_firmwarexnv-6080xnp-6320_firmwarexno-l6120rxno-c6083rxno-c8083r_firmwarexnv-8082r_firmwareqno-c6083rxnp-6120hxnv-6012m_firmwareqnd-c8023rqnv-c9083rxnd-6080rvxnd-6081fxno-8080r_firmwarexno-8040r_firmwarexnf-8010r_firmwarexnv-8081rqno-c8083rxno-8080rxno-6120rxnp-6321tnv-c8014rm_firmwarexnd-6011fqnv-c8013r_firmwarekno-5020rnqnv-c8012_firmwarexnv-6011xno-6080rxnv-6011w_firmwarexno-l6080ra_firmwarekno-2010rnxnp-6400_firmwarekno-2120rnpnm-9000vd_firmwarexnp-6550rh_firmwarexnd-8081vz_firmwarexnd-k6080n_firmwareqnv-c9011rxnp-6320hsxnd-6081vzqnd-c8023r_firmwarexnd-6010xnv-6083r_firmwareknp-2320rhaxnv-8081zxnp-6320htnb-6030_firmwarexno-6080rsxnb-8000_firmwarexno-6120_firmwarexnd-6081v_firmwareknd-2080rnxnd-6020rxnf-9010rs_firmwareqno-c8013rxno-9083rxnv-8020rmpxno-6120rsxnv-l6080ra_firmwaretnv-7010rcxnd-l6080vaxnv-6080rs_firmwaretnv-7010rc_firmwarexnb-6000qne-c8013rlqno-c8023rxnv-8080rwxno-c6083r_firmwarexnv-8080rw_firmwarexno-6080r_firmwarexnf-8010rvmxnp-c6403r__firmwarexnd-6080rwxnv-6080r_firmwarepnm-9084qzxnv-8040r_firmwarexnz-l6320a_firmwarepnm-9320vqp_firmwareknd-2020rn_firmwarexnv-6022r_firmwarexnp-6550rhqnv-c8023r_firmwarepnm-9081vq_firmwarexnv-8080rs_firmwarepnm-9084rqzxnv-8083zxno-6085rxnf-8010rvwxnp-6320rhxno-l6020r_firmwarexnd-8020rxno-c7083r_firmwarexnp-c6403rw_firmwarexnp-9250r_firmwarexno-6085r_firmwarexnz-l6320xnp-9250rxnv-6080rsaqnf-c9010v_firmwarexnd-c7083rv_firmwarepnm-9084rqz1xnp-6320rh_firmwarexnv-8020rmp_firmwarepnm-9085rqz1_firmwarekno-2080rnxnv-6011wxnv-9082r_firmwarexno-l6120r_firmwarexnd-8081rfxnz-6320knd-2080rn_firmwareqnp-6320xnb-6001xnd-6081f_firmwarexnv-6010_firmwarexnp-8250knb-2000xnd-8081rev_firmwarexnd-8082rf_firmwarexno-l6080r_firmwarexnv-l6080rxnd-8082rv_firmwarexnv-6013m_firmwarexno-c9083r_firmwareqnp-6250rxno-l6080raxno-c9083rxnb-6001_firmwarexnd-8020r_firmwarexnf-9013rvxnv-6020r_firmwarexnd-l6080rv_firmwareqno-c8023r_firmwarexnb-8002xnd-8020f_firmwarexnp-6320xnv-l6080r_firmwarexnv-8093rpnm-9002vqpnm-9322vqp_firmwarexnb-6002_firmwarexnb-9003_firmwaretnv-c8034rmxno-6020r_firmwareqnv-c8013rxnd-6083rv_firmwarepnm-9322vqpxnv-8083rxnd-6080_firmwarepnm-9321vqpxnp-6400rw_firmwarexno-l6020rxno-8083r_firmwarepnm-7002vdtnv-c8034rm_firmwarexnd-8080r_firmwarexnf-8010rv_firmwarexnf-8010rw_firmwarexno-6120r_firmwarepnm-9080vqxnv-6013mxnf-9010rv_firmwarexnd-6080rw_firmwarexnp-6400r_firmwarexnf-8010rvm_firmwarexnp-8300rwxnb-6003xnd-8083rvxxnv-6081rxnb-8000xnd-8020rw_firmwareqno-c6083r_firmwarexno-8080rw_firmwarexnd-8020rwxnv-l6080apnm-9085rqz1qno-c9083r_firmwarexnv-6080rsqnf-8010_firmwarepnm-9000vdxnd-9082rf_firmwareqnv-c8012xno-6010rQNV-C8012
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-22199
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-1.78% / 82.51%
||
7 Day CHG~0.00%
Published-11 Jan, 2024 | 17:39
Updated-14 Nov, 2024 | 14:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Django Template Engine Vulnerable to XSS

This package provides universal methods to use multiple template engines with the Fiber web framework using the Views interface. This vulnerability specifically impacts web applications that render user-supplied data through this template engine, potentially leading to the execution of malicious scripts in users' browsers when visiting affected web pages. The vulnerability has been addressed, the template engine now defaults to having autoescape set to `true`, effectively mitigating the risk of XSS attacks.

Action-Not Available
Vendor-gofibergofiber
Product-djangotemplate
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CWE ID-CWE-20
Improper Input Validation
CVE-2024-21627
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.1||HIGH
EPSS-0.95% / 76.16%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 21:03
Updated-03 Jun, 2025 | 14:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Some attribute not escaped in Validate::isCleanHTML method

PrestaShop is an open-source e-commerce platform. Prior to versions 8.1.3 and 1.7.8.11, some event attributes are not detected by the `isCleanHTML` method. Some modules using the `isCleanHTML` method could be vulnerable to cross-site scripting. Versions 8.1.3 and 1.7.8.11 contain a patch for this issue. The best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of `HTML` type will call `isCleanHTML`.

Action-Not Available
Vendor-PrestaShop S.A
Product-prestashopPrestaShop
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12001
Matching Score-4
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
ShareView Details
Matching Score-4
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
CVSS Score-10||CRITICAL
EPSS-0.11% / 29.58%
||
7 Day CHG~0.00%
Published-20 Oct, 2025 | 21:53
Updated-07 Nov, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Content-Type Header

Lack of application manifest sanitation could lead to potential stored XSS.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.

Action-Not Available
Vendor-azure-accessAzure Access Technology
Product-blu-ic2blu-ic4_firmwareblu-ic2_firmwareblu-ic4BLU-IC2BLU-IC4
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-25626
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.71% / 72.14%
||
7 Day CHG~0.00%
Published-30 Sep, 2020 | 19:24
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.

Action-Not Available
Vendor-encoden/aDebian GNU/LinuxRed Hat, Inc.
Product-django_rest_frameworkdebian_linuxceph_storageDjango REST Framework
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-25611
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.36% / 57.78%
||
7 Day CHG~0.00%
Published-18 Dec, 2020 | 07:11
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The AWV portal of Mitel MiCollab before 9.2 could allow an attacker to gain access to conference information by sending arbitrary code due to improper input validation, aka XSS. Successful exploitation could allow an attacker to view user conference information.

Action-Not Available
Vendor-n/aMitel Networks Corp.
Product-micollabn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-20
Improper Input Validation
CVE-2020-12742
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.47% / 64.27%
||
7 Day CHG~0.00%
Published-13 May, 2020 | 12:45
Updated-04 Aug, 2024 | 12:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The iubenda-cookie-law-solution plugin before 2.3.5 for WordPress does not restrict URL sanitization to http protocols.

Action-Not Available
Vendor-iubendan/a
Product-iubenda-cookie-law-solutionn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2023-3042
Matching Score-4
Assigner-dotCMS LLC
ShareView Details
Matching Score-4
Assigner-dotCMS LLC
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 39.16%
||
7 Day CHG~0.00%
Published-17 Oct, 2023 | 22:52
Updated-12 Jun, 2025 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CNA SHORTNAME: dotCMSORG UUID: 5b9d93f2-25c7-46b4-ab60-d201718c9dd8

In dotCMS, versions mentioned, a flaw in the NormalizationFilter does not strip double slashes (//) from URLs, potentially enabling bypasses for XSS and access controls. An example affected URL is https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp , which should return a 404 response but didn't. The oversight in the default invalid URL character list can be viewed at the provided GitHub link https://github.com/dotCMS/core/blob/master/dotCMS/src/main/java/com/dotcms/filters/NormalizationFilter.java#L37 .  To mitigate, users can block URLs with double slashes at firewalls or utilize dotCMS config variables. Specifically, they can use the DOT_URI_NORMALIZATION_FORBIDDEN_STRINGS environmental variable to add // to the list of invalid strings. Additionally, the DOT_URI_NORMALIZATION_FORBIDDEN_REGEX variable offers more detailed control, for instance, to block //html.* URLs. Fix Version:23.06+, LTS 22.03.7+, LTS 23.01.4+

Action-Not Available
Vendor-dotCMS, LLC
Product-dotcmsdotCMS core
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-20
Improper Input Validation
CVE-2023-28733
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-7.2||HIGH
EPSS-0.16% / 36.50%
||
7 Day CHG~0.00%
Published-30 Mar, 2023 | 11:27
Updated-11 Feb, 2025 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stored XSS affecting the AcyMailing plugin for Joomla

AnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.

Action-Not Available
Vendor-AcyMailing (Altavia Jetpulp SAS, formerly ACYBA)
Product-acymailingNewsletter Plugin for Joomla in the Enterprise version
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-26159
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-7.3||HIGH
EPSS-0.09% / 25.81%
||
7 Day CHG-0.01%
Published-02 Jan, 2024 | 05:00
Updated-03 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

Action-Not Available
Vendor-follow-redirectsn/a
Product-follow_redirectsfollow-redirects
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2022-1243
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.2||HIGH
EPSS-0.33% / 55.85%
||
7 Day CHG~0.00%
Published-05 Apr, 2022 | 15:05
Updated-02 Aug, 2024 | 23:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CRHTLF can lead to invalid protocol extraction potentially leading to XSS in medialize/uri.js

CRHTLF can lead to invalid protocol extraction potentially leading to XSS in GitHub repository medialize/uri.js prior to 1.19.11.

Action-Not Available
Vendor-uri.js_projectmedialize
Product-uri.jsmedialize/uri.js
CWE ID-CWE-20
Improper Input Validation
CVE-2019-6696
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.20% / 41.61%
||
7 Day CHG~0.00%
Published-15 Mar, 2020 | 22:03
Updated-25 Oct, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper input validation vulnerability in FortiOS 6.2.1, 6.2.0, 6.0.8 and below until 5.4.0 under admin webUI may allow an attacker to perform an URL redirect attack via a specifically crafted request to the admin initial password change webpage.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosFortinet FortiOS
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1954
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.25% / 47.98%
||
7 Day CHG~0.00%
Published-08 Aug, 2019 | 07:30
Updated-21 Nov, 2024 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Meetings Server Open Redirection Vulnerability

A vulnerability in the web-based management interface of Cisco Webex Meetings Server Software could allow an unauthenticated, remote attacker to redirect a user to an undesired web page. The vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected device. An attacker could exploit this vulnerability by crafting an HTTP request that could cause the web application to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious website.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetings_serverCisco WebEx Meetings Server
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • Next
Details not found