A Stored Cross-Site Scripting (XSS) vulnerability exists in SeedDMS 6.0.29. A user or rogue admin with the "Add Category" permission can inject a malicious XSS payload into the category name field. When a document is subsequently associated with this category, the payload is stored on the server and rendered without proper sanitization or output encoding. This results in the XSS payload executing in the browser of any user who views the document.
References
Link | Resource |
---|---|
https://github.com/RoNiXxCybSeC0101/CVE-2025-25461 | Exploit Third Party Advisory |
https://www.seeddms.org/ | Product |
https://github.com/RoNiXxCybSeC0101/CVE-2025-25461 | Exploit Third Party Advisory |
Configurations
History
09 Jul 2025, 19:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:seeddms:seeddms:6.0.29:*:*:*:*:*:*:* | |
References | () https://github.com/RoNiXxCybSeC0101/CVE-2025-25461 - Exploit, Third Party Advisory | |
References | () https://www.seeddms.org/ - Product | |
First Time |
Seeddms seeddms
Seeddms |
|
Summary |
|
28 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-28 16:15
Updated : 2025-07-09 19:32
NVD link : CVE-2025-25461
Mitre link : CVE-2025-25461
CVE.ORG link : CVE-2025-25461
JSON object : View
Products Affected
seeddms
- seeddms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')