CVE-2025-5198

A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* that is applied to a secured cluster. This object can be used by a user with access to the cluster or through a compromised third-party product.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2025-5198 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2368568 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2368568 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:kubernates:*:*

Configuration 2 (hide)

cpe:2.3:a:stackrox:stackrox:-:*:*:*:*:*:*:*

History

19 Jun 2025, 00:08

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-27 21:15

Updated : 2025-06-19 00:08


NVD link : CVE-2025-5198

Mitre link : CVE-2025-5198

CVE.ORG link : CVE-2025-5198


JSON object : View

Products Affected

redhat

  • advanced_cluster_security

stackrox

  • stackrox
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')