the BMA login interface allows arbitrary JavaScript or HTML to be written straight into the page’s Document Object Model via the error= URL parameter
References
| Link | Resource |
|---|---|
| https://bugcrowd.com/disclosures/30a330ef-0885-458c-a64f-2ad63d196b4d/dom-based-cross-site-scripting-xss-with-keylogger-injection-via-the-error-parameter-in-barracuda-mail-archiver | Exploit Issue Tracking Mitigation Third Party Advisory |
| https://bugcrowd.com/disclosures/30a330ef-0885-458c-a64f-2ad63d196b4d/dom-based-cross-site-scripting-xss-with-keylogger-injection-via-the-error-parameter-in-barracuda-mail-archiver | Exploit Issue Tracking Mitigation Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-07-30 00:15
Updated : 2025-08-06 14:05
NVD link : CVE-2025-8319
Mitre link : CVE-2025-8319
CVE.ORG link : CVE-2025-8319
JSON object : View
Products Affected
barracuda
- message_archiver_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
