REDAXO, Reflected XSS, CVE-2025-27412 (Medium)

Listen to this Post

How the CVE Works

CVE-2025-27412 is a reflected Cross-Site Scripting (XSS) vulnerability in REDAXO CMS versions 5.0.0 through 5.18.2. The flaw exists in the `rex-api-result` parameter, which fails to properly sanitize user-supplied input before rendering it in the AddOns page. An attacker can craft a malicious URL containing JavaScript payloads, which executes when an authenticated admin visits the manipulated link. This allows arbitrary script execution in the context of the admin session, potentially leading to session hijacking or unauthorized actions. The issue is patched in version 5.18.3.

DailyCVE Form

Platform: REDAXO CMS
Version: 5.0.0 – 5.18.2
Vulnerability: Reflected XSS
Severity: Medium
Date: 07/01/2025

Prediction: Patch expected by 03/10/2025

What Undercode Say

curl -X GET "http://redaxo-site/addons?rex-api-result=<script>alert('XSS')</script>"
// Example vulnerable code snippet
echo $_GET['rex-api-result']; // Unsanitized output

How Exploit

1. Craft malicious URL with JavaScript payload.

2. Trick admin into clicking the link.

3. Payload executes in admin context.

Protection from this CVE

Update to REDAXO 5.18.3.

Sanitize `rex-api-result` input.

Implement Content Security Policy (CSP).

Impact

Session hijacking.

Unauthorized admin actions.

Data manipulation.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top