First published: Tue Apr 29 2025(Updated: )
Reflected Cross-Site Scripting (XSS) vulnerability in Bookgy. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending a malicious URL through the "TEXTO" parameter in /api/api_ajustes.php.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Bookgy |
The vulnerability has been fixed by the Bookgy team in October 2024 and are no longer exploitable today.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-40615 is considered a critical severity vulnerability due to its ability to execute JavaScript code in users' browsers via reflected cross-site scripting.
To fix CVE-2025-40615, ensure that all user-input data is properly sanitized and validated, particularly in the "TEXTO" parameter of /api/api_ajustes.php.
CVE-2025-40615 can allow attackers to perform session hijacking, credential theft, and redirect users to malicious sites.
CVE-2025-40615 affects all versions of Bookgy that are vulnerable to the reflected cross-site scripting flaw.
To mitigate risks, implement proper content security policies and use frameworks that automatically handle data encoding and sanitization.