REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. This issue has been patched in version 5.20.1.
History

Wed, 26 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 26 Nov 2025 02:45:00 +0000

Type Values Removed Values Added
Description REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. This issue has been patched in version 5.20.1.
Title REDAXO is Vulnerable to Reflected XSS in Mediapool Info Banner via args[types]
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-26T02:01:44.814Z

Updated: 2025-11-26T15:14:37.329Z

Reserved: 2025-11-21T01:08:02.614Z

Link: CVE-2025-66026

cve-icon Vulnrichment

Updated: 2025-11-26T15:14:28.553Z

cve-icon NVD

Status : Received

Published: 2025-11-26T03:15:58.440

Modified: 2025-11-26T16:15:50.917

Link: CVE-2025-66026

cve-icon Redhat

No data.