PT-2025-48111 · Redaxo · Redaxo
Published
2025-11-25
·
Updated
2025-11-29
·
CVE-2025-66026
CVSS v3.1
6.1
6.1
Medium
| Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
REDAXO versions prior to 5.20.1
Description
REDAXO is a PHP-based CMS. A reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter
args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. The vulnerability is located in redaxo/src/addons/mediapool/pages/index.php and redaxo/src/addons/mediapool/pages/media.list.php. The parameter args[types] is read via rex request('args', 'array') and passed to media.list.php, where it is injected into an HTML string without proper escaping using the rex view::info() function. An attacker can exploit this by crafting a URL with malicious JavaScript code within the args[types] parameter, which will then be executed in the victim's browser when they access the link. This could lead to the theft of session cookies, CSRF tokens, or other sensitive data, and allow an attacker to perform administrative actions on behalf of the affected user.Recommendations
Versions prior to 5.20.1 should be updated to version 5.20.1 or later.
Exploit
Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2025-66026
GHSA-X6VR-Q3VF-VQGQ
Affected Products
Redaxo
References · 13
- 🔥 https://github.com/redaxo/redaxo/security/advisories/GHSA-x6vr-q3vf-vqgq⭐ 345 🔗 113 · Exploit
- https://osv.dev/vulnerability/GHSA-x6vr-q3vf-vqgq · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-66026 · Security Note
- https://osv.dev/vulnerability/CVE-2025-66026 · Vendor Advisory
- https://github.com/redaxo/redaxo/commit/58929062312cf03e344ab04067a365e6b6ee66aa⭐ 345 🔗 113 · Note
- https://github.com/redaxo/redaxo⭐ 345 🔗 113 · Note
- https://reddit.com/r/VulnMatter/comments/1p9ah42/resumen_diario_de_vulnerabilidades_29112025 · Reddit Post
- https://reddit.com/r/VulnMatter/comments/1p8bkgw/resumen_diario_de_vulnerabilidades_27112025 · Reddit Post
- https://twitter.com/VulmonFeeds/status/1993639962734989551 · Twitter Post
- https://t.me/cveNotify/144047 · Telegram Post
- https://reddit.com/r/VulnMatter/comments/1p8bkku/resumen_diario_de_vulnerabilidades_27112025 · Reddit Post
- https://t.me/CVEtracker/38258 · Telegram Post
- https://reddit.com/r/VulnMatter/comments/1p9dokj/resumen_diario_de_vulnerabilidades_29112025 · Reddit Post