6.5
CVE-2025-25363
- EPSS 0.07%
- Veröffentlicht 13.03.2025 18:15:50
- Zuletzt bearbeitet 03.04.2025 16:43:59
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An authenticated stored cross-site scripting (XSS) vulnerability in The Plugin People Enterprise Mail Handler for Jira Data Center (JEMH) before v4.1.69-dc allows attackers with Administrator privileges to execute arbitrary Javascript in context of a user's browser via injecting a crafted payload into the HTML field of a template.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Thepluginpeople ≫ Enterprise Mail Handler SwPlatformjira Version >= 4.1.53-dc < 4.1.69-dc
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.21 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 6.5 | 2.3 | 3.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
|
CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.