Vulnerability Description
A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* that is applied to a secured cluster. This object can be used by a user with access to the cluster or through a compromised third-party product.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Advanced Cluster Security | 4.0 |
| Stackrox | Stackrox | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2025-5198Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2368568Issue TrackingThird Party Advisory
- https://github.com/stackrox/stackrox/pull/13336
FAQ
What is CVE-2025-5198?
CVE-2025-5198 is a vulnerability with a CVSS score of 5.0 (MEDIUM). A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is...
How severe is CVE-2025-5198?
CVE-2025-5198 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-5198?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Advanced Cluster Security, Stackrox Stackrox.