diskover-web v2.3.0 Community Edition is vulnerable to multiple reflected cross-site scripting (XSS) flaws in its web interface. Unsanitized GET parameters including maxage, maxindex, index, path, q (query), and doctype are directly echoed into the HTML response, allowing attackers to inject and execute arbitrary JavaScript when a victim visits a maliciously crafted URL.
References
Configurations
History
09 Sep 2025, 18:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Diskoverdata diskover
Diskoverdata |
|
CPE | cpe:2.3:a:diskoverdata:diskover:2.3.0:*:*:*:community:*:*:* | |
References | () https://github.com/4rdr/proofs/blob/main/info/diskover-web-v2.3.0-community-edition-reflected-xss.md - Exploit |
29 Aug 2025, 16:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.6 |
27 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-27 15:15
Updated : 2025-09-09 18:53
NVD link : CVE-2025-50985
Mitre link : CVE-2025-50985
CVE.ORG link : CVE-2025-50985
JSON object : View
Products Affected
diskoverdata
- diskover
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')