Vulnerability Description
Xibo is an open source digital signage platform with a web content management system (CMS). Versions 4.3.0 and below contain a Remote Code Execution vulnerability in the CMS Developer menu's Module Templating functionality, allowing authenticated users with "System -> Add/Edit custom modules and templates" permissions to manipulate Twig filters and execute arbitrary server-side functions as the web server user. This issue is fixed in version 4.3.1. To workaround this issue, use the 4.1 and 4.2 patch commits.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xibosignage | Xibo | >= 4.1.0, < 4.3.1 |
Related Weaknesses (CWE)
References
- https://github.com/xibosignage/xibo-cms/commit/0f4e88396111ea027785a48dd8f5eeb14Patch
- https://github.com/xibosignage/xibo-cms/commit/ecd4f9d2cea739a46756a108a839cac80Patch
- https://github.com/xibosignage/xibo-cms/releases/tag/4.3.1Release Notes
- https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-7rmm-689c-gjgvThird Party Advisory
- https://patch-diff.githubusercontent.com/raw/xibosignage/xibo-cms/pull/3128.patcProduct
FAQ
What is CVE-2025-62369?
CVE-2025-62369 is a vulnerability with a CVSS score of 7.2 (HIGH). Xibo is an open source digital signage platform with a web content management system (CMS). Versions 4.3.0 and below contain a Remote Code Execution vulnerability in the CMS Developer menu's Module Te...
How severe is CVE-2025-62369?
CVE-2025-62369 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-62369?
Check the references section above for vendor advisories and patch information. Affected products include: Xibosignage Xibo.