First published: Tue Mar 11 2025(Updated: )
A vulnerability was found in MRCMS 3.1.2. It has been classified as problematic. Affected is the function rename of the file /admin/file/rename.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument name/path leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mrcms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2195 has been classified as a problematic vulnerability.
To fix CVE-2025-2195, ensure that proper input validation and sanitization are implemented in the function handling filename manipulations.
CVE-2025-2195 is a cross-site scripting (XSS) vulnerability.
CVE-2025-2195 affects the file renaming function within the org.marker.mushroom.controller.FileController of MRCMS.
CVE-2025-2195 is present in MRCMS version 3.1.2.