First published: Tue Mar 11 2025(Updated: )
A vulnerability was found in MRCMS 3.1.2. It has been declared as problematic. Affected by this vulnerability is the function upload of the file /admin/file/upload.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mrcms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2196 has been declared as problematic, indicating a significant security risk.
To fix CVE-2025-2196, ensure you update MRCMS to the latest version that addresses this vulnerability.
The vulnerability affects MRCMS version 3.1.2, specifically the file upload functionality in the FileController component.
CVE-2025-2196 is a cross-site scripting (XSS) vulnerability due to improper handling of file path arguments.
To mitigate CVE-2025-2196, implement input validation and restrict file upload paths to trusted directories.