A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler. The manipulation of the argument default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/GeSHi/geshi-1.0/issues/159 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 | Exploit Issue Tracking Third Party Advisory |
| https://vuldb.com/?ctiid.299036 | Permissions Required VDB Entry |
| https://vuldb.com/?id.299036 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.507418 | Exploit Third Party Advisory VDB Entry |
| https://github.com/GeSHi/geshi-1.0/issues/159 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-03-09 15:15
Updated : 2025-06-23 18:53
NVD link : CVE-2025-2123
Mitre link : CVE-2025-2123
CVE.ORG link : CVE-2025-2123
JSON object : View
Products Affected
qbnz
- geshi
