CVE-2025-2123

A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler. The manipulation of the argument default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/GeSHi/geshi-1.0/issues/159 Exploit Issue Tracking Third Party Advisory
https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.299036 Permissions Required VDB Entry
https://vuldb.com/?id.299036 Third Party Advisory VDB Entry
https://vuldb.com/?submit.507418 Exploit Third Party Advisory VDB Entry
https://github.com/GeSHi/geshi-1.0/issues/159 Exploit Issue Tracking Third Party Advisory
https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:qbnz:geshi:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-03-09 15:15

Updated : 2025-06-23 18:53


NVD link : CVE-2025-2123

Mitre link : CVE-2025-2123

CVE.ORG link : CVE-2025-2123


JSON object : View

Products Affected

qbnz

  • geshi
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')