CVE-2025-7053 – cockpit-hq/cockpit
Package
Manager: composer
Name: cockpit-hq/cockpit
Vulnerable Version: >=0 <2.11.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
EPSS: 0.00036 pctl0.09034
Details
Cockpit - Content Platform vulnerable to XSS through name or email argument names A vulnerability was found in Cockpit versions up to 2.11.3. This issue affects some unknown processing instances of the file /system/users/save. The manipulation of the arguments "name" or "email" leads to cross-site scripting. The attack may be initiated remotely. Upgrading to version 2.11.4 will address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure and acted accordingly. A patch and new release were made available very quickly.
Metadata
Created: 2025-07-04T03:30:32Z
Modified: 2025-07-04T13:02:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-j4rj-fgcq-wmqp/GHSA-j4rj-fgcq-wmqp.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-j4rj-fgcq-wmqp
Finding: F425
Auto approve: 1