logo

CVE-2025-7053 cockpit-hq/cockpit

Package

Manager: composer
Name: cockpit-hq/cockpit
Vulnerable Version: >=0 <2.11.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

EPSS: 0.00036 pctl0.09034

Details

Cockpit - Content Platform vulnerable to XSS through name or email argument names A vulnerability was found in Cockpit versions up to 2.11.3. This issue affects some unknown processing instances of the file /system/users/save. The manipulation of the arguments "name" or "email" leads to cross-site scripting. The attack may be initiated remotely. Upgrading to version 2.11.4 will address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure and acted accordingly. A patch and new release were made available very quickly.

Metadata

Created: 2025-07-04T03:30:32Z
Modified: 2025-07-04T13:02:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-j4rj-fgcq-wmqp/GHSA-j4rj-fgcq-wmqp.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-j4rj-fgcq-wmqp
Finding: F425
Auto approve: 1