A vulnerability was found in GFI KerioConnect 10.0.6. It has been classified as problematic. Affected is an unknown function of the component File Upload. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/0xs1ash/poc/blob/main/xss.md#2-when-a-file-with-a-malicious-javascript-code-in-its-name-is-uploaded-to-the-system-it-is-displayed-again-on-the-page-within-the-input-field-without-being-sanitized-this-creates-the-potential-for-an-xss-att | Broken Link |
| https://vuldb.com/?ctiid.302028 | Permissions Required VDB Entry |
| https://vuldb.com/?id.302028 | Third Party Advisory VDB Entry |
Configurations
History
04 Nov 2025, 19:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Gfi
Gfi kerio Connect |
|
| CPE | cpe:2.3:a:gfi:kerio_connect:10.0.6:-:*:*:*:*:*:* | |
| References | () https://github.com/0xs1ash/poc/blob/main/xss.md#2-when-a-file-with-a-malicious-javascript-code-in-its-name-is-uploaded-to-the-system-it-is-displayed-again-on-the-page-within-the-input-field-without-being-sanitized-this-creates-the-potential-for-an-xss-att - Broken Link | |
| References | () https://vuldb.com/?ctiid.302028 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.302028 - Third Party Advisory, VDB Entry |
01 Apr 2025, 20:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
31 Mar 2025, 05:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-31 05:15
Updated : 2025-11-04 19:36
NVD link : CVE-2025-2976
Mitre link : CVE-2025-2976
CVE.ORG link : CVE-2025-2976
JSON object : View
Products Affected
gfi
- kerio_connect
