{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-22142","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-12-30T03:00:33.653Z","datePublished":"2025-01-13T19:56:59.869Z","dateUpdated":"2025-01-13T20:07:05.344Z"},"containers":{"cna":{"title":"Cross-site Scripting in NamelessMC","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/NamelessMC/Nameless/security/advisories/GHSA-9q22-w64p-g8qm","tags":["x_refsource_CONFIRM"],"url":"https://github.com/NamelessMC/Nameless/security/advisories/GHSA-9q22-w64p-g8qm"},{"name":"https://github.com/NamelessMC/Nameless/releases/tag/v2.1.3","tags":["x_refsource_MISC"],"url":"https://github.com/NamelessMC/Nameless/releases/tag/v2.1.3"}],"affected":[{"vendor":"NamelessMC","product":"Nameless","versions":[{"version":"<= 2.1.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-01-13T19:56:59.869Z"},"descriptions":[{"lang":"en","value":"NamelessMC is a free, easy to use & powerful website software for Minecraft servers. In affected versions an admin can add the ability to have users fill out an additional field and users can inject javascript code into it that would be activated once a staffer visits the user's profile on staff panel. As a result an attacker can execute javascript code on the staffer's computer. This issue has been addressed in version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability."}],"source":{"advisory":"GHSA-9q22-w64p-g8qm","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/NamelessMC/Nameless/security/advisories/GHSA-9q22-w64p-g8qm","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-13T20:06:38.399802Z","id":"CVE-2025-22142","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-13T20:07:05.344Z"}}]}}