CVE-2025-8550

A vulnerability was found in atjiu pybbs up to 6.0.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/topic/list. The manipulation of the argument Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named 2fe4a51afbce0068c291bc1818bbc8f7f3b01a22. It is recommended to apply a patch to fix this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pybbs_project:pybbs:*:*:*:*:*:*:*:*

History

04 Sep 2025, 15:37

Type Values Removed Values Added
References () https://github.com/atjiu/pybbs/commit/2fe4a51afbce0068c291bc1818bbc8f7f3b01a22 - () https://github.com/atjiu/pybbs/commit/2fe4a51afbce0068c291bc1818bbc8f7f3b01a22 - Patch
References () https://github.com/atjiu/pybbs/issues/203 - () https://github.com/atjiu/pybbs/issues/203 - Exploit, Issue Tracking
References () https://github.com/atjiu/pybbs/issues/203#issue-3256392964 - () https://github.com/atjiu/pybbs/issues/203#issue-3256392964 - Exploit, Issue Tracking
References () https://github.com/atjiu/pybbs/issues/203#issuecomment-3134774288 - () https://github.com/atjiu/pybbs/issues/203#issuecomment-3134774288 - Issue Tracking
References () https://vuldb.com/?ctiid.318679 - () https://vuldb.com/?ctiid.318679 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.318679 - () https://vuldb.com/?id.318679 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.622194 - () https://vuldb.com/?submit.622194 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:pybbs_project:pybbs:*:*:*:*:*:*:*:*
First Time Pybbs Project pybbs
Pybbs Project

05 Aug 2025, 14:34

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en atjiu pybbs hasta la versión 6.0.0. Se ha declarado problemática. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/topic/list. La manipulación del argumento "Username" provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama 2fe4a51afbce0068c291bc1818bbc8f7f3b01a22. Se recomienda aplicar un parche para solucionar este problema.

05 Aug 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-05 07:15

Updated : 2025-09-04 15:37


NVD link : CVE-2025-8550

Mitre link : CVE-2025-8550

CVE.ORG link : CVE-2025-8550


JSON object : View

Products Affected

pybbs_project

  • pybbs
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')