CVE-2025-2123

A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler. The manipulation of the argument default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/GeSHi/geshi-1.0/issues/159 Exploit Issue Tracking Third Party Advisory
https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.299036 Permissions Required VDB Entry
https://vuldb.com/?id.299036 Third Party Advisory VDB Entry
https://vuldb.com/?submit.507418 Exploit Third Party Advisory VDB Entry
https://github.com/GeSHi/geshi-1.0/issues/159 Exploit Issue Tracking Third Party Advisory
https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:qbnz:geshi:*:*:*:*:*:*:*:*

History

23 Jun 2025, 18:53

Type Values Removed Values Added
CPE cpe:2.3:a:qbnz:geshi:*:*:*:*:*:*:*:*
First Time Qbnz geshi
Qbnz
References () https://github.com/GeSHi/geshi-1.0/issues/159 - () https://github.com/GeSHi/geshi-1.0/issues/159 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 - () https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.299036 - () https://vuldb.com/?ctiid.299036 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.299036 - () https://vuldb.com/?id.299036 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.507418 - () https://vuldb.com/?submit.507418 - Exploit, Third Party Advisory, VDB Entry
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como problemática en GeSHi hasta la versión 1.0.9.1. La función get_var del archivo /contrib/cssgen.php del componente CSS Handler se ve afectada por este problema. La manipulación del argumento default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments provoca cross site scripting. El ataque puede ejecutarse de forma remota. Se ha hecho público el exploit y puede que sea utilizado.

10 Mar 2025, 16:15

Type Values Removed Values Added
References () https://github.com/GeSHi/geshi-1.0/issues/159 - () https://github.com/GeSHi/geshi-1.0/issues/159 -
References () https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 - () https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694 -

09 Mar 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-09 15:15

Updated : 2025-06-23 18:53


NVD link : CVE-2025-2123

Mitre link : CVE-2025-2123

CVE.ORG link : CVE-2025-2123


JSON object : View

Products Affected

qbnz

  • geshi
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')