Vulnerability Description
A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler. The manipulation of the argument default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qbnz | Geshi | <= 1.0.9.1 |
Related Weaknesses (CWE)
References
- https://github.com/GeSHi/geshi-1.0/issues/159ExploitIssue TrackingThird Party Advisory
- https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.299036Permissions RequiredVDB Entry
- https://vuldb.com/?id.299036Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.507418ExploitThird Party AdvisoryVDB Entry
- https://github.com/GeSHi/geshi-1.0/issues/159ExploitIssue TrackingThird Party Advisory
- https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2025-2123?
CVE-2025-2123 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler...
How severe is CVE-2025-2123?
CVE-2025-2123 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-2123?
Check the references section above for vendor advisories and patch information. Affected products include: Qbnz Geshi.