An issue in Kickdler before v1.107.0 allows attackers to provide an XSS payload via a HTTP response splitting attack.
References
| Link | Resource |
|---|---|
| https://github.com/jet-pentest/CVE-2024-25175 | Exploit Third Party Advisory |
| https://www.kickidler.com/ | Product |
| https://github.com/jet-pentest/CVE-2024-25175 | Exploit Third Party Advisory |
| https://www.kickidler.com/ | Product |
Configurations
History
19 Sep 2025, 15:07
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Kickdler kickdler
Kickdler |
|
| References | () https://github.com/jet-pentest/CVE-2024-25175 - Exploit, Third Party Advisory | |
| References | () https://www.kickidler.com/ - Product | |
| CPE | cpe:2.3:a:kickdler:kickdler:*:*:*:*:*:*:*:* |
Information
Published : 2024-03-25 15:15
Updated : 2025-09-19 15:07
NVD link : CVE-2024-25175
Mitre link : CVE-2024-25175
CVE.ORG link : CVE-2024-25175
JSON object : View
Products Affected
kickdler
- kickdler
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
