{"api_version":"1","generated_at":"2026-04-18T04:17:10+00:00","cve":"CVE-2021-25969","urls":{"html":"https://cve.report/CVE-2021-25969","api":"https://cve.report/api/cve/CVE-2021-25969.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-25969","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-25969"},"summary":{"title":"CVE-2021-25969","description":"In Camaleon CMS application, versions 0.0.1 to 2.6.0 are vulnerable to stored XSS, that allows an unauthenticated attacker to store malicious scripts in the comments section of the post. These scripts are executed in a victim’s browser when they open the page containing the malicious comment.","state":"PUBLIC","assigner":"vulnerabilitylab@whitesourcesoftware.com","published_at":"2021-10-20 12:15:00","updated_at":"2021-11-29 17:22:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c","name":"https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c","refsource":"MISC","tags":[],"title":"Sanitize comments · owen2345/camaleon-cms@05506e9 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969","name":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969","refsource":"MISC","tags":[],"title":"CVE-2021-25969 | WhiteSource Vulnerability Database","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-25969","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25969","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"25969","vulnerable":"1","versionEndIncluding":"2.6.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tuzitio","cpe5":"camaleon_cms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"vulnerabilitylab@whitesourcesoftware.com","ID":"CVE-2021-25969","STATE":"PUBLIC","TITLE":"Camaleon CMS - Stored Cross-Site Scripting (XSS) in Comments"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"camaleon_cms","version":{"version_data":[{"version_affected":">=","version_value":"0.0.1"},{"version_affected":"<=","version_value":"2.6.0"}]}}]},"vendor_name":"camaleon_cms"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Camaleon CMS application, versions 0.0.1 to 2.6.0 are vulnerable to stored XSS, that allows an unauthenticated attacker to store malicious scripts in the comments section of the post. These scripts are executed in a victim’s browser when they open the page containing the malicious comment."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c","name":"https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c"},{"refsource":"MISC","url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969","name":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969"}]},"solution":[{"lang":"eng","value":"Update to 2.6.0.1"}],"source":{"advisory":"https://www.whitesourcesoftware.com/vulnerability-database/","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-10-20 12:15:00","lastModifiedDate":"2021-11-29 17:22:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tuzitio:camaleon_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"0.0.1","versionEndIncluding":"2.6.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"25969","Ordinal":"200896","Title":"CVE-2021-25969","CVE":"CVE-2021-25969","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"25969","Ordinal":"1","NoteData":"In Camaleon CMS application, versions 0.0.1 to 2.6.0 are vulnerable to stored XSS, that allows an unauthenticated attacker to store malicious scripts in the comments section of the post. These scripts are executed in a victim’s browser when they open the page containing the malicious comment.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"25969","Ordinal":"2","NoteData":"2021-10-20","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"25969","Ordinal":"3","NoteData":"2021-11-26","Type":"Other","Title":"Modified"}]}}}