When LDAP authentication is activated in the configuration it is possible to obtain reflected XSS execution by creating a custom URL that the victim only needs to open in order to execute arbitrary JavaScript code in the victim's browser. This is due to a fault in the file login.php where the content of "$_SERVER['PHP_SELF']" is reflected into the HTML of the website. Hence the attacker does not need a valid account in order to exploit this issue.
Metrics
Affected Vendors & Products
References
History
Mon, 17 Mar 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: SEC-VLab
Published: 2024-05-29T12:22:46.526Z
Updated: 2025-03-17T20:39:15.968Z
Reserved: 2024-02-13T09:28:28.810Z
Link: CVE-2024-25976

Updated: 2024-08-01T23:52:06.357Z

Status : Awaiting Analysis
Published: 2024-05-29T13:15:49.563
Modified: 2025-03-17T21:15:13.083
Link: CVE-2024-25976

No data.