First published: Sat May 10 2025(Updated: )
A vulnerability has been found in JAdmin-JAVA JAdmin 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /memoAjax/save. The manipulation of the argument ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
JAdmin-JAVA JAdmin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4495 is classified as a problematic vulnerability due to its potential for cross-site scripting attacks.
CVE-2025-4495 affects the file /memoAjax/save, where manipulation of the argument ID can lead to cross-site scripting.
Yes, CVE-2025-4495 can be exploited remotely, making it particularly concerning for users of JAdmin-JAVA JAdmin 1.0.
To mitigate CVE-2025-4495, it is recommended to apply security patches as soon as they are available from the vendor.
The main security risk associated with CVE-2025-4495 is the possibility of executing arbitrary scripts in the context of a user's browser, leading to further exploitation.