Vulnerability Description
A vulnerability, which was classified as problematic, has been found in Gnuboard g6 up to 6.0.10. This issue affects some unknown processing of the file /bbs/scrap_popin_update/qa/ of the component Post Reply Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sir | Gnuboard | <= 6.0.10 |
Related Weaknesses (CWE)
References
- https://github.com/gnuboard/g6/issues/645ExploitIssue Tracking
- https://vuldb.com/?ctiid.316847Permissions RequiredVDB Entry
- https://vuldb.com/?id.316847Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.615735Third Party AdvisoryVDB Entry
- https://github.com/gnuboard/g6/issues/645ExploitIssue Tracking
FAQ
What is CVE-2025-7786?
CVE-2025-7786 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability, which was classified as problematic, has been found in Gnuboard g6 up to 6.0.10. This issue affects some unknown processing of the file /bbs/scrap_popin_update/qa/ of the component Po...
How severe is CVE-2025-7786?
CVE-2025-7786 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-7786?
Check the references section above for vendor advisories and patch information. Affected products include: Sir Gnuboard.