Input provided in a field containing "activationMessage" in Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack.


This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).
Advisories
Source ID Title
EUVD EUVD EUVD-2025-16004 Input provided in a field containing "activationMessage" in Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 21 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 May 2025 13:15:00 +0000

Type Values Removed Values Added
Description Input provided in a field containing "activationMessage" in Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).
Title XSS in Proget MDM
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 2.4, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2025-05-21T13:24:17.340Z

Reserved: 2025-02-18T13:43:49.957Z

Link: CVE-2025-1420

cve-icon Vulnrichment

Updated: 2025-05-21T13:24:13.300Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-21T13:16:02.283

Modified: 2025-05-21T20:24:58.133

Link: CVE-2025-1420

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses