CVE-2025-45315

A cross-site scripting (XSS) vulnerability in the /controller/admin.php endpoint of hortusfox-web v4.4 allows attackers to execute arbitrary JavaScript in the context of a user's browser via a crafted payload injected into the email parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hortusfox:hortusfox:4.4:*:*:*:*:*:*:*

History

18 Aug 2025, 15:12

Type Values Removed Values Added
References () http://hortusfox-web.com - () http://hortusfox-web.com - Broken Link
References () https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45315/CVE-2025-45315.md - () https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45315/CVE-2025-45315.md - Exploit, Third Party Advisory
References () https://github.com/danielbrendel/hortusfox-web - () https://github.com/danielbrendel/hortusfox-web - Product
References () https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/controller/admin.php#L192 - () https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/controller/admin.php#L192 - Product
CPE cpe:2.3:a:hortusfox:hortusfox:4.4:*:*:*:*:*:*:*
First Time Hortusfox
Hortusfox hortusfox

14 Aug 2025, 13:12

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de Cross-Site Scripting (XSS) en el endpoint /controller/admin.php de hortusfox-web v4.4 permite a los atacantes ejecutar JavaScript arbitrario en el contexto del navegador de un usuario a través de un payload manipulado inyectado en el parámetro de correo electrónico.

13 Aug 2025, 21:15

Type Values Removed Values Added
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4

13 Aug 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-13 18:15

Updated : 2025-08-18 15:12


NVD link : CVE-2025-45315

Mitre link : CVE-2025-45315

CVE.ORG link : CVE-2025-45315


JSON object : View

Products Affected

hortusfox

  • hortusfox
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')