{"containers":{"cna":{"affected":[{"product":"camaleon_cms","vendor":"camaleon_cms","versions":[{"lessThan":"unspecified","status":"affected","version":"0.0.1","versionType":"custom"},{"lessThanOrEqual":"2.6.0","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"In Camaleon CMS application, versions 0.0.1 to 2.6.0 are vulnerable to stored XSS, that allows an unauthenticated attacker to store malicious scripts in the comments section of the post. These scripts are executed in a victim’s browser when they open the page containing the malicious comment."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-11-26T13:43:59.000Z","orgId":"478c68dd-22c1-4a41-97cd-654224dfacff","shortName":"Mend"},"references":[{"tags":["x_refsource_MISC"],"url":"https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c"},{"tags":["x_refsource_MISC"],"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969"}],"solutions":[{"lang":"en","value":"Update to 2.6.0.1"}],"source":{"advisory":"https://www.whitesourcesoftware.com/vulnerability-database/","discovery":"UNKNOWN"},"title":"Camaleon CMS - Stored Cross-Site Scripting (XSS) in Comments","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vulnerabilitylab@whitesourcesoftware.com","ID":"CVE-2021-25969","STATE":"PUBLIC","TITLE":"Camaleon CMS - Stored Cross-Site Scripting (XSS) in Comments"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"camaleon_cms","version":{"version_data":[{"version_affected":">=","version_value":"0.0.1"},{"version_affected":"<=","version_value":"2.6.0"}]}}]},"vendor_name":"camaleon_cms"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Camaleon CMS application, versions 0.0.1 to 2.6.0 are vulnerable to stored XSS, that allows an unauthenticated attacker to store malicious scripts in the comments section of the post. These scripts are executed in a victim’s browser when they open the page containing the malicious comment."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c","refsource":"MISC","url":"https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c"},{"name":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969","refsource":"MISC","url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969"}]},"solution":[{"lang":"en","value":"Update to 2.6.0.1"}],"source":{"advisory":"https://www.whitesourcesoftware.com/vulnerability-database/","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T20:19:18.964Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25969"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-30T15:50:22.959731Z","id":"CVE-2021-25969","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-30T15:57:20.923Z"}}]},"cveMetadata":{"assignerOrgId":"478c68dd-22c1-4a41-97cd-654224dfacff","assignerShortName":"Mend","cveId":"CVE-2021-25969","datePublished":"2021-10-20T11:55:14.000Z","dateReserved":"2021-01-22T00:00:00.000Z","dateUpdated":"2025-04-30T15:57:20.923Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}