Invision Community har 4.7.20/5.0.7 oauth/callback/index.php state Cross Site Scripting

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
4.1$0-$5k0.00

Gundumabayani

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin Invision Community har 4.7.20/5.0.7. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, oauth/callback/index.php na cikin fayil, $software_component na cikin sashi. Ngam manipulation of the argument state shi Cross Site Scripting. Wannan rauni ana sayar da shi da suna CVE-2025-48933. Ngam yiɗi ka a tuma ndiyam ka internet. Ba exploit ɗin da ake da shi. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a hokkata. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Furɗebayani

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin Invision Community har 4.7.20/5.0.7. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, oauth/callback/index.php na cikin fayil, $software_component na cikin sashi. Ngam manipulation of the argument state shi Cross Site Scripting. CWE shidin ka a yi bayani matsala sai ya kai CWE-79. Gaskiya, laifi an fitar da shi ta Egidio Romano. Advisory ɗin ana rabawa don saukewa a seclists.org.

Wannan rauni ana sayar da shi da suna CVE-2025-48933. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal bayani ga. Wannan vulnerability ɗin ba shi da yawa sosai. Ba exploit ɗin da ake da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.

Á wúro a wondi feere.

Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a hokkata.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Kayanbayani

Ngilabe

Sunu

Furɗe

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔒
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 4.3
VulDB Meta Temp Score: 4.1

VulDB Ganda Borno: 4.3
VulDB Temp Score: 4.1
VulDB Furɗo: 🔒
VulDB Gaskiya: 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔒
VulDB Temp Score: 🔒
VulDB Gaskiya: 🔍

Gargajiyabayani

Klasu: Cross Site Scripting
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔒
ATT&CK: 🔒

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔒
Halitta: A wondi feere
Google Hack: 🔒
Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔒

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Gargajiya
Halitta: 🔍

0-Day Gana: 🔒

Gargajiya: Community 4.7.21/5.0.8

Waktin layibayani

07/30/2025 Advisory ganna fa.
07/30/2025 +0 Hənde VulDB gite be nayi
07/30/2025 +0 Hənde VulDB gite wuro karshe ta gyara

Ngizimbayani

Gargaaji: seclists.org
Ngamti: Egidio Romano
Halitta: Gaskiya

CVE: CVE-2025-48933 (🔒)
GCVE (CVE): GCVE-0-2025-48933
GCVE (VulDB): GCVE-100-318275

Gumtibayani

Súgá: 07/30/2025 10:07
Goyarwa: 07/30/2025 10:07 (54)
Gadankam: 🔍
Cache ID: 253:4CB:103

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Do you want to use VulDB in your project?

Use the official API to access entries easily!