CVE-2025-62369

Source
https://cve.org/CVERecord?id=CVE-2025-62369
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62369.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-62369
Aliases
  • GHSA-7rmm-689c-gjgv
Published
2025-11-04T21:18:38.880Z
Modified
2026-04-02T12:57:45.225102Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Xibo CMS: Remote Code Execution through module templates
Details

Xibo is an open source digital signage platform with a web content management system (CMS). Versions 4.3.0 and below contain a Remote Code Execution vulnerability in the CMS Developer menu's Module Templating functionality, allowing authenticated users with "System -> Add/Edit custom modules and templates" permissions to manipulate Twig filters and execute arbitrary server-side functions as the web server user. This issue is fixed in version 4.3.1. To workaround this issue, use the 4.1 and 4.2 patch commits.

Database specific
{
    "cwe_ids": [
        "CWE-1336",
        "CWE-94"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62369.json"
}
References

Affected packages

Git / github.com/xibosignage/xibo-cms

Affected ranges

Type
GIT
Repo
https://github.com/xibosignage/xibo-cms
Events

Affected versions

4.*
4.1.0
4.1.1
4.1.2
4.2.0
4.2.1
4.2.2
4.2.3
4.3.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62369.json"