Vulnerability Description
An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. A PHP script in the source code echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Davidstutz | Bootstrap Multiselect | 1.1.2 |
Related Weaknesses (CWE)
References
- https://github.com/davidstutz/bootstrap-multiselect/releasesRelease Notes
- https://github.com/projectdiscovery/nuclei-templates/commit/11e1a6c11d3954f44acfPatch
FAQ
What is CVE-2025-47204?
CVE-2025-47204 is a vulnerability with a CVSS score of 6.1 (MEDIUM). An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. A PHP script in the source code echoes arbitrary POST data. If a developer adopts this structure wholesa...
How severe is CVE-2025-47204?
CVE-2025-47204 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-47204?
Check the references section above for vendor advisories and patch information. Affected products include: Davidstutz Bootstrap Multiselect.