REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. This issue has been patched in version 5.20.1.
Metrics
Affected Vendors & Products
References
History
Wed, 26 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. This issue has been patched in version 5.20.1. | |
| Title | REDAXO is Vulnerable to Reflected XSS in Mediapool Info Banner via args[types] | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-26T02:01:44.814Z
Updated: 2025-11-26T15:14:37.329Z
Reserved: 2025-11-21T01:08:02.614Z
Link: CVE-2025-66026
Updated: 2025-11-26T15:14:28.553Z
Status : Received
Published: 2025-11-26T03:15:58.440
Modified: 2025-11-26T16:15:50.917
Link: CVE-2025-66026
No data.