A vulnerability, which was classified as problematic, was found in ContiNew Admin up to 3.6.0. Affected is an unknown function of the file /dev-api/common/file. The manipulation of the argument File leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/uglory-gll/javasec/blob/main/continew-admin.md#1stored-cross-site-scripting | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.308298 | Permissions Required VDB Entry |
| https://vuldb.com/?id.308298 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.567568 | Third Party Advisory VDB Entry |
Configurations
History
10 Nov 2025, 15:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:continew:continew_admin:*:*:*:*:*:*:*:* | |
| First Time |
Continew continew Admin
Continew |
|
| References | () https://github.com/uglory-gll/javasec/blob/main/continew-admin.md#1stored-cross-site-scripting - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.308298 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.308298 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.567568 - Third Party Advisory, VDB Entry |
12 May 2025, 17:32
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
11 May 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-11 23:15
Updated : 2025-11-10 15:09
NVD link : CVE-2025-4551
Mitre link : CVE-2025-4551
CVE.ORG link : CVE-2025-4551
JSON object : View
Products Affected
continew
- continew_admin
